US20130201988A1 - Method for pruning a multicast branch, protocol independent multicast router, and layer-2 exchange - Google Patents

Method for pruning a multicast branch, protocol independent multicast router, and layer-2 exchange Download PDF

Info

Publication number
US20130201988A1
US20130201988A1 US13/876,141 US201113876141A US2013201988A1 US 20130201988 A1 US20130201988 A1 US 20130201988A1 US 201113876141 A US201113876141 A US 201113876141A US 2013201988 A1 US2013201988 A1 US 2013201988A1
Authority
US
United States
Prior art keywords
pim
multicast
port
message
prune
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US13/876,141
Other versions
US9497034B2 (en
Inventor
Di Zhou
Yu Liu
Qianye Chen
Xusheng Chen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Enterprise Development LP
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Assigned to HANGZHOU H3C TECHNOLOGIES CO., LTD. reassignment HANGZHOU H3C TECHNOLOGIES CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHEN, QIANYE, CHEN, XUSHENG, LIU, YU, ZHOU, DI
Publication of US20130201988A1 publication Critical patent/US20130201988A1/en
Assigned to HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP reassignment HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: H3C TECHNOLOGIES CO., LTD., HANGZHOU H3C TECHNOLOGIES CO., LTD.
Application granted granted Critical
Publication of US9497034B2 publication Critical patent/US9497034B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/185Arrangements for providing special services to substations for broadcast or conference, e.g. multicast with management of multicast group membership
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/16Multipoint routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/15Flow control; Congestion control in relation to multipoint traffic

Definitions

  • a multicast system includes a multicast source, one or multiple receivers and a multicast group.
  • the source host sends data only once, and the destination address of the data is the address of the multicast group.
  • Each receiver in the multicast group receives a copy of the data, and only the receivers in the multicast group can receive the data.
  • IGMP Internet Group Management Protocol: a protocol for managing IP multicast members in the TCP/IP (Transmission Control Protocol/Internet Protocol) protocol family, which is for establishing and maintaining relations of multicast group members between an IP host and adjacent multicast routers.
  • IGSP Internet Group Management Protocol Snooping: a multicast restriction scheme running in layer-2 devices, which is for managing and controlling multicast groups.
  • a layer-2 device which runs IGMP snooping analyzes a received IGMP packet, establishes a mapping relation between a port and a multicast MAC (Media Access Control) address, and forwards multicast data according to the mapping relation.
  • MAC Media Access Control
  • PIM a protocol which provides IP multicast routing by utilizing a unicast routing table established using static routing or any unicast routing protocol such as RIP, OSPF, IS-IS, BGP and so on, and is for maintaining propagation of multicast data between layer-three devices.
  • PIM protocol has four modes, i.e., PIM-DM (Dense Mode), PIM-SM (Spare Mode), PIM-SSM (Source-Specific Multicast) and bi-directional PIM.
  • IP multicast techniques effectively solve problems existing in one-to-many transmissions, implement efficient one-to-many data transmission in an IP network, and can save a large amount of network bandwidth and reduce network loads.
  • Some new value-added services including Internet information services, such as online live broadcast, IPTV, remote education, Telemedicine, internet radio, real-time video conference, and so on, are able to gain greater development by taking advantage of the multicast functions of the network.
  • FIG. 1 is a schematic diagram illustrating a structure of a multicast network.
  • FIG. 2 is a flowchart illustrating a method for pruning a multicast branch according to an example.
  • FIG. 3 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SSM after receiving a multicast flow according to an example.
  • FIG. 4 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SSM after receiving a PIM prune message from a downstream PIM router or an IGMP leave message from a client served by the first hop PIM router according to an example.
  • FIG. 5 is a flowchart illustrating a process performed by a layer-2 exchange after receiving a PIM prune message according to an example.
  • FIG. 6 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SSM after receiving a PIM join message from a downstream PIM router according to an example.
  • FIG. 7 is a flowchart illustrating a process performed by a layer-2 exchange after receiving a PIM join message according to an example.
  • FIG. 8 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SSM after receiving an IGMP join message according to an example.
  • FIG. 9 is a flowchart illustrating a process performed by a layer-2 exchange after receiving a PIM join message according to an example.
  • FIG. 10 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SM after receiving a multicast flow according to an example.
  • FIG. 11 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-DM after receiving a multicast flow according to an example.
  • FIG. 12 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-DM after receiving a PIM graft message from a PIM neighbor according to an example.
  • FIG. 13 is a schematic diagram illustrating a structure of a PIM router according to an example.
  • FIG. 14 is a schematic diagram illustrating a structure of a PIM router according to an example.
  • the PIM protocol is the currently prevailing multicast routing protocol in use today.
  • IGMP snooping and PIM snooping are also commonly adopted layer-2 multicast control protocols.
  • PIM snooping whose importance is only below that of IGMP snooping, is for snooping PIM hello messages, PIM join messages, and PIM prune messages to control the forwarding of a multicast flow to intended routers.
  • PIM snooping exchanges may produce positive outcomes only when deployed between PIM routers, but may not achieve the same outcomes when deployed between a multicast source and a PIM router.
  • FIG. 1 is a schematic diagram illustrating a structure of a multicast network.
  • a multicast source accesses the network via one or more layer-2 exchanges
  • a client accesses the network via a layer-2 exchange or a PIM router.
  • multiple layer-2 exchanges converge at a PIM router.
  • multicast sources 1 and 2 access the network respectively via layer-2 exchanges 5 and 6
  • layer-2 exchanges 1 and 2 converge at PIM router 2 .
  • the PIM router may send a source register message to an RP (Rendezvous Point) if the PIM router is a DR (Designated Router).
  • RP Rendezvous Point
  • the RP detects that an (S,G) entry corresponding to the multicast flow, i.e., an entry recording the source address and group address of the multicast flow, has not been established in the RP, which indicates no client subscribes to the multicast flow, the RP sends a source quench message to the DR.
  • the client when a client subscribes to the multicast flow, the client sends an IGMP join message to a leaf router, and the leaf router sends a PIM join message to the RP.
  • the RP After receiving the PIM join message, the RP sends a PIM join message to the DR, and subsequently, the multicast flow reaches the multicast receiver via the RP.
  • the first hop PIM router refers to the first PIM router encountered by the multicast flow from the multicast source.
  • the RP is a PIM router providing centralized management of multicast flow information, and acts as a medium between multicast sources and multicast receivers.
  • a multicast flow from a multicast source is first sent to a first hop PIM router via one or multiple exchanges, which increases cache memory consumption in the exchanges.
  • Cache memory for egress ports of an exchange plays an important role in keeping service flows, especially those with bursts such as videos and so on, in order, in preventing packet loss and in reducing jitter. Therefore, forwarding of data flows whose forwarding is not necessary should be prevented to reduce the consumption of cache memory for egress ports of an exchange.
  • Current protocols cannot prune off unnecessary multicast flows between a multicast source and a PIM router on the data link layer.
  • the whole network adopts the same version of a multicast group management protocol, e.g., adopts one of IGMPv2, IGMPv3, MLDv1 (Multicast Listener Discovery Protocol Version 1) and MLDv2.
  • a multicast flow is identified by a multicast group identification.
  • a multicast flow is identified by a multicast source identification+a multicast group identification.
  • the adopted PIM protocol is PIM-SSM or PIM-DM.
  • PIM-SSM the adopted IGMP version is IGMPv3, in which the IGSP version is IGMPv3 snooping.
  • a layer-2 exchange with PIM snooping functions has a new role for ports, i.e., prune ports.
  • prune ports When a layer-2 exchange with PIM snooping functions receives a PIM prune message from a first hop PIM router for a multicast flow, the port receiving the message is set as a prune port. Afterwards, the multicast flow is prohibited from being forwarded to the prune port.
  • a layer-2 exchange supporting multicast has four roles for ports, i.e., router ports and membership ports for IGMP snooping, prune ports and upstream ports for PIM snooping.
  • a router port is a downstream port, i.e., a port receiving a PIM join message.
  • the downstream ports are called router ports because they perform the same functions, i.e., connecting routers, forwarding all multicast flows.
  • a rule of processing such a port includes: adding the port into the entries when the role with the highest priority of the port is a membership port, and not adding the port to the entries when the role with the highest priority of the port is a prune port.
  • the only role of a port is a router port, it is assumed that the role with the highest priority of the port is a router port, and the port is added into the layer-2 forwarding table entries.
  • a PIM snooping table entry includes: an (S,G) entry, an upstream neighbor list, a down stream neighbor list, and so on.
  • FIG. 2 is a flowchart illustrating a method for pruning a multicast branch according to an example. As shown in FIG. 2 , the method may include the following operations.
  • a layer-2 exchange receives a PIM hello message from a PIM router, sets a port from which the message is received as a router port by utilizing IGMP snooping functions, and maintains a PIM router list according to the message by utilizing PIM snooping functions.
  • Each entry of the PIM router list includes: an address of a PIM router sending a PIM hello message and a port number of the port connecting the layer-2 exchange with the PIM router.
  • the address of the PIM router sending the PIM hello message may be obtained from a source address field in the PIM hello message.
  • the port number of the port connecting the layer-2 exchange with the PIM router refers to the port number from which the PIM hello message is received by the layer-2 exchange.
  • a port adopting a PIM protocol may send a PIM hello message at intervals to an external device.
  • the layer-2 exchange may forward the message to other layer-2 exchanges, and other layer-2 exchanges also perform the operations at block 201 after receiving the message.
  • the first hop PIM router sends a PIM prune message for the multicast flow via the port from which the multicast flow is received when a determination that receipt of the multicast flow is not required is made.
  • the first hop PIM router searches in a multicast routing table for an entry corresponding to the multicast flow, deletes the port from which the multicast flow is received from the entry, and sends a PIM prune message for the multicast flow via the port from which the multicast flow is received when a list of egress ports in the entry is empty.
  • the frequency at which the PIM prune message is sent at blocks 202 and 203 is restricted, i.e., the PIM prune message will not be repetitively sent within a short time when the same multicast flow is continuously received.
  • the default time interval between each transmission of the PIM prune message is one minute. The transmission of the PIM prune message is stopped when the branch of the multicast flow is pruned off or a new demand for the multicast flow is received from local clients.
  • a layer-2 exchange between the first hop router and the multicast source receives the PIM prune message, sets a port from which the PIM prune message is received as a prune port when detecting an upstream neighbor address in the message is not in a list of PIM routers maintained by the PIM snooping functions of the layer-2 exchange, and stops forwarding the multicast flow via the prune port.
  • FIG. 3 and FIG. 4 respectively illustrate detailed processing procedures of the above two types of multicast flow by a first hop PIM router adopting PIM-SSM.
  • FIG. 3 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SSM after receiving a multicast flow according to an example. As shown in FIG. 3 , the process may include the following operations.
  • the first hop PIM router (Rtr) periodically sends a PIM hello message via each PIM port of the first hop PIM.
  • a layer-2 exchange receives the PIM hello message, sets a port from which the message is received as a router port by utilizing IGMP snooping functions, and forwards the PIM hello message via each port of the layer-2 exchange to other layer-2 exchanges.
  • IGMP snooping is the common characteristic of all layer-2 exchanges supporting multicast.
  • An exchange with IGMP snooping functions regards a port from which an IGMP general query message or a PIM packet is received as a router port, and regards a port from which an IGMP join message is received as a membership port.
  • An exchange with IGMP snooping functions may send all received multicast flows to a router port, and send a multicast flow of a multicast group only to a membership port.
  • Other layer-2 exchanges may also perform the operations at block 302 after receiving the PIM hello message.
  • a multicast source initiates a multicast flow, and the multicast flow is forwarded to a first hop PIM router (Rtr) via each router port.
  • Rtr first hop PIM router
  • the Rtr determines whether the Rtr has established an (S,G) entry corresponding to the multicast flow, and performs operations at block 305 when the entry has been established, or performs operations at block 308 when the entry has not been established.
  • the Rtr determines whether a list of egress ports in the (S,G) entry is empty, performs operations at block 306 when the list is empty, or performs operations at block 307 when the list is not empty.
  • the Rtr updates an aging time of the (S,G) entry, sends a PIM prune message via a port from which the multicast flow is received, and the process is terminated.
  • the upstream neighbor address of the PIM prune message is the IP address of the multicast source, the destination IP address is the IP address of the multicast source and the destination MAC address is the MAC address of the multicast source.
  • the PIM prune message Since the PIM prune message is sent from the port via which the multicast flow enters the Rtr, the PIM prune message will reach a layer-2 exchange between the multicast source and the Rtr.
  • the layer-2 exchange may perform the processing procedures shown in FIG. 5 after receiving the PIM prune message.
  • the Rtr forwards the multicast flow to external devices according to egress port information in the egress port list, and the process is terminated.
  • the Rtr establishes an (S,G) entry for the multicast flow, configures an aging time for the entry, and sends a PIM prune message to an external device via the port from which the multicast flow is received.
  • the aging time of the (S,G) entry is generally configured as three minutes.
  • the upstream neighbor address of the PIM prune message is the IP address of the multicast source, the destination IP address is the IP address of the multicast source and the destination MAC address is the MAC address of the multicast source.
  • the Rtr may further send a source register message for the multicast flow to an RP.
  • FIG. 4 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SSM after receiving a PIM prune message from a downstream PIM router or an IGMP leave message from a client connected to the first hop PIM router according to an example. As shown in FIG. 4 , the process may include the following operations.
  • the first hop PIM router receives a PIM prune message sent by a downstream PIM router for a multicast flow or an IGMP leave message sent by a client connected to the Rtr for a multicast flow, searches for an (S,G) entry corresponding to the multicast flow, and processes the (S,G) entry according to the PIM protocol.
  • the multicast receiver may send an IGMP leave message for the multicast flow to a leaf router of the multicast receiver.
  • the leaf router sends a PIM prune message to an RP for the multicast flow after receiving the IGMP leave message.
  • the RP forwards the PIM prune message in the direction of the first hop PIM router.
  • the Rtr generally deletes a port from which the PIM prune message is received from a list of egress ports in the (S,G) entry.
  • the Rtr determines whether an egress port list in the (S,G) entry is empty, performs operations at block 403 when the list is empty, or performs operations at block 404 when the list is not empty.
  • the Rtr sends the PIM prune message to an external device via the port from which the multicast flow is received, and the process is terminated.
  • the upstream neighbor address of the PIM prune message is the IP address of the multicast source, the destination IP address is the IP address of the multicast source and the destination MAC address is the MAC address of the multicast source.
  • the PIM prune message Since the PIM prune message is sent from the port via which the multicast flow enters the Rtr, the PIM prune message will reach the layer-2 exchange between the multicast source and the Rtr.
  • the layer-2 exchange may perform the processing procedures shown in FIG. 5 after receiving the PIM prune message.
  • the Rtr performs no further operations.
  • FIG. 5 is a flowchart illustrating a process performed by a layer-2 exchange after receiving a PIM prune message according to an example. As shown in FIG. 5 , the process may include the following operations.
  • a layer-2 exchange receives a PIM prune message for a multicast flow.
  • the layer-2 exchange determines whether the upstream neighbor address in the PIM prune message is in a list of PIM routers that are maintained by PIM snooping functions of the layer-2 exchange, performs operations at block 503 if the upstream neighbor address is in the list, or performs operations at block 504 if the upstream neighbor address is not in the list.
  • the layer-2 exchange performs processing according to a current PIM snooping protocol, and the process is terminated.
  • the processing according to current PIM snooping protocol is performed. Otherwise, this is an indication that the layer-2 exchange is deployed between the multicast source and the first hop PIM router, thus the processing according to an example is adopted, i.e., operations at blocks 504 to 509 .
  • the layer-2 exchange determines whether there is a PIM snooping entry for the multicast flow in the layer-2 exchange, performs operations at block 505 when there is the PIM snooping entry, or performs operations at block 506 when there is no such PIM snooping entry.
  • the layer-2 exchange adds the port from which the PIM prune message is received into a list of downstream egress ports in the PIM snooping entry, marks the port as a prune port, and performs operations at block 507 .
  • the layer-2 exchange generates a PIM snooping table entry according to the PIM prune message.
  • the upstream port in the PIM snooping entry is set to be an egress port found in a unicast destination MAC table entry according to the destination MAC address of the PIM prune message.
  • the upstream neighbor list is empty.
  • the port from which the PIM prune message is received is added into a downstream egress port list in the entry, and is marked as a prune port. All PIM neighbor ports except the upstream ports are added into the downstream egress port list in the PIM snooping table entry.
  • the layer-2 exchange forwards the multicast flow via all PIM neighbor ports except upstream ports by default. Therefore, at this block, after a PIM snooping table entry is established for the multicast flow, all PIM neighbor ports except the upstream ports and marked prune ports are added into the downstream egress port list of the PIM snooping table entry in order to guarantee that the multicast flow will be forwarded to all PIM neighbor ports except the upstream ports when the multicast flow is subsequently received.
  • the layer-2 exchange determines whether it is necessary to forward the multicast flow corresponding to the PIM prune message according to PIM snooping table entries and IGMP snooping table entries in the layer-2 exchange, i.e., determining whether there is a PIM snooping table entry or an IGMP snooping table entry having a port whose role of the highest priority is membership port or router port, and performs operations at block 508 if there is, or performing operations at block 509 if there is not.
  • the layer-2 exchange does not forward the PIM prune message, and the process is terminated.
  • the layer-2 exchange searches in unicast destination MAC table entries for an egress port according to a unicast destination MAC address of the PIM prune message, and forwards the PIM prune message via the egress port.
  • the PIM prune message then reaches the multicast source.
  • a lifetime value may be set for a prune port in a PIM snooping table entry.
  • the lifetime value of a prune port may be 1 ⁇ 3 of the lifetime value of the (S,G) entry of the multicast flow in the PIM router, e.g., one minute by default. Therefore, a PIM DR may receive the multicast flow every one minute.
  • all the prune ports in a PIM snooping entry may temporarily be set as router ports to have the multicast flow forwarded through the ports. If no PIM prune message for the multicast flow is received from a port within a pre-defined time period from the time the lifetime value of the prune port expires, the port is formally set as a router port.
  • a branch may be grafted to the multicast flow.
  • a branch should be grafted between a multicast source and a first hop PIM router for a multicast flow that satisfies any of the following three conditions:
  • the client may send an IGMP join message to the downstream PIM router, and the downstream PIM router may send a PIM join message to the first hop PIM router after receiving the IGMP join message;
  • the client may send an IGMP join message to the layer-2 exchange;
  • the client may send an IGMP join message to the first hop PIM router.
  • FIG. 6 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SSM after receiving a PIM join message from a downstream PIM router according to an example. As shown in FIG. 6 , the process may include the following operations.
  • a first hop PIM router receives a PIM join message for a multicast flow from a downstream PIM router, searches for an (S,G) entry corresponding to the multicast flow in the first hop PIM router.
  • PIM router 2 is a first hop PIM router
  • PIM router 1 is a downstream PIM router of PIM router 2
  • PIM router 1 is connected to client 1 .
  • the client subscribes to a multicast flow
  • the client may send an IGMP join message for the multicast flow to the downstream PIM router.
  • the downstream PIM router may send a PIM join message for the multicast flow to the first hop PIM router, e.g., the PIM router 2 , after receiving the IGMP join message.
  • the Rtr determines whether a list of egress ports in the (S,G) entry is empty, performs operations at block 603 when the list is empty, or performs operations at block 604 when the list is not empty.
  • the Rtr adds the port from which the PIM join message is received into an egress port list in the (S,G) entry, searches in a unicast routing table for an entry corresponding to the destination IP address of the message, sends a PIM join message through an egress port in the unicast routing table entry, and then the process is terminated.
  • the destination IP address of the PIM join message is the IP address of the multicast source, the destination MAC address being the MAC address of the multicast source.
  • the PIM join message may be forwarded to the multicast source through one or more layer-2 exchanges between the Rtr and the multicast source.
  • the processing procedures of the PIM join message by a layer-2 exchange may be as shown in FIG. 9 .
  • the Rtr may send the PIM join message at a high frequency until the multicast flow is received.
  • the Rtr processes the PIM join message according to a current PIM protocol.
  • FIG. 7 is a flowchart illustrating a process performed by a layer-2 exchange after receiving an IGMP join message according to an example. As shown in FIG. 5 , the process may include the following operations.
  • a layer-2 exchange receives an IGMP join message for a multicast flow.
  • the IGMP join message is initiated by a client connected to the layer-2 exchange.
  • the layer-2 exchange searches in the layer-2 exchange for an IGMP snooping table entry corresponding to the multicast flow, adds a port from which the message is received into the IGMP snooping table entry as a membership port, and forwards the IGMP join message to all router ports, prune ports and upstream neighbors in a PIM snooping table entry except to the port from which the message is received.
  • the IGMP join message may reach other layer-2 exchanges or the first hop PIM router.
  • a processing procedure of the IGMP join message by the other layer-2 exchanges is the same as that in this example.
  • An example of a processing procedure of the IGMP join message by the first hop PIM router is as shown in FIG. 8 .
  • FIG. 8 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SSM after receiving an IGMP join message according to an example. As shown in FIG. 8 , the process may include the following operations.
  • a first hop PIM router receives an IGMP join message for a multicast flow.
  • the IGMP join message may be initiated from the following two types of sources.
  • Source 1 when the first hop PIM router is connected to a client, as shown in FIG. 1 , PIM router 2 is the first hop PIM router and is connected to client 2 . If the client subscribes to a multicast flow, the client may send an IGMP join message to the first hop PIM router.
  • Source 2 when a layer-2 exchange between the multicast source and the first hop PIM router is connected to a client, as shown in FIG. 1 where PIM router 2 is the first hop PIM router, and layer-2 exchange 1 between PIM router 2 and multicast sources 1 and 2 is connected to client 3 . If client 3 subscribes to a multicast flow, client 3 may send an IGMP join message to layer-2 exchange 1 . Layer-2 exchange 1 may forward the IGMP join message to the first hop PIM router.
  • the Rtr determines whether the Rtr has established an (S,G) entry corresponding to the multicast flow, and performs operations at block 803 when the entry has been established, or performs operations at block 808 when the entry has not been established.
  • the Rtr determines whether an egress port list of the (S,G) entry is empty, performs operations at block 804 when the list is empty, or performs operations at block 807 when the list is not empty.
  • the Rtr determines whether the IGMP join message is from a port leading to the multicast source, and performs operations at block 805 if the IGMP join message is from the port, or performs operations at block 806 if the IGMP join message is not from the port.
  • the IGMP join message is from a port leading to the multicast source, i.e., the source of the IGMP join message is the Source 2 at block 801 , thus there is no need to add the port receiving the IGMP join message into the egress port list of the (S,G) entry, nor to send a PIM join message.
  • the Rtr performs no further processing, and the process is terminated.
  • the Rtr adds the port from which the IGMP join message is received into the egress port list of the (S,G) entry, sends a PIM join message for the multicast flow in the direction of the multicast source (S), and the process is terminated.
  • the destination IP address of the PIM join message is the IP address of the multicast source, the destination MAC address being the MAC address of the multicast source.
  • the PIM join message may be forwarded to the multicast source through layer-2 exchanges between the Rtr and the multicast source.
  • the processing procedures of the PIM join message by a layer-2 exchange may be as shown in FIG. 9 .
  • the Rtr may send the PIM join message at a high frequency until the multicast flow is received.
  • the Rtr performs processing according to a current PIM protocol, and the process is terminated.
  • the Rtr may add the port from which the IGMP join message is received into the egress port list of the (S,G) entry.
  • the Rtr performs processing according to a current PIM protocol.
  • the Rtr may establish an (S,G) entry corresponding to the multicast flow, and may add the port receiving the IGMP join message into the egress port list of the (S,G) entry.
  • FIG. 9 is a flowchart illustrating a process performed by a layer-2 exchange after receiving a PIM join message according to an example. As shown in FIG. 9 , the process may include the following operations.
  • a layer-2 exchange receives a PIM join message for a multicast flow.
  • the layer-2 exchange determines whether the upstream neighbor address in the PIM join message is in a list of PIM routers which are maintained by PIM snooping functions of the layer-2 exchange, performs operations at block 903 if the upstream neighbor address is in the list, or performs operations at block 904 if the upstream neighbor address is not in the list.
  • the layer-2 exchange performs processing according to a current PIM snooping protocol, and then the process is terminated.
  • the layer-2 exchange determines whether there is a PIM snooping table entry for the multicast flow in the layer-2 exchange, performs operations at block 905 when a PIM snooping table entry exists, or performs operations at block 906 when no such PIM snooping table entry exists.
  • the layer-2 exchange determines whether the port from which the PIM join message is received is a prune port in the PIM snooping table entry, and performs operations at block 907 when the port is a prune port, or performs operations at block 906 when the port is not a prune port.
  • the layer-2 exchange performs no further processing, and the process is terminated.
  • the layer-2 exchange determines whether there is another port needing to forward the multicast flow except the port receiving the PIM join message according to local PIM snooping table entries and IGMP snooping table entries, and performs operations at block 908 when such a port exists, or performs operations at block 909 when such a port does not exist.
  • the layer-2 exchange does not forward the PIM join message, and performs operations at block 910 .
  • the layer-2 exchange searches in a unicast routing table for an entry according to the destination IP address of the PIM join message, forwards the PIM join message via egress ports in the unicast routing table entry, and performs operations at block 910 .
  • the layer-2 exchange deletes the mark which labels the receiving port of the PIM join message as a prune port from a downstream egress port list of the PIM snooping table entry, sets the receiving port of the PIM join message as a router port and forwards the multicast flow via the port.
  • the layer-2 exchange judges whether the downstream egress port list of the PIM snooping table entry does not include a prune port and the upstream neighbor list is empty, performs operations at block 912 if the downstream egress port list of the PIM snooping table entry does not include a prune port and the upstream neighbor list is empty; otherwise, performs operations at block 913 .
  • the layer-2 exchange deletes the PIM snooping table entry to save table entry resources, and the process is terminated.
  • the layer-2 exchange performs no further processing.
  • FIG. 10 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SM after receiving a multicast flow according to an example. As shown in FIG. 10 , the process may include the following operations.
  • the first hop PIM router (Rtr) periodically sends a PIM hello message via each PIM port of the first hop PIM.
  • a layer-2 exchange receives the PIM hello message, sets a port from which the message is received as a router port by utilizing IGMP snooping functions, and forwards the PIM hello message via each port of the layer-2 exchange to other layer-2 exchanges.
  • Other layer-2 exchanges may also perform the operations at block 1002 after receiving the PIM hello message.
  • a multicast source initiates a multicast flow, and the multicast flow is forwarded to a first hop PIM Rtr via each router port.
  • the Rtr judges whether the Rtr has established an (S,G) entry corresponding to the multicast flow, and performs operations at block 1005 when the entry has been established, or performs operations at block 1008 when the entry has not been established.
  • the Rtr judges whether an egress port list of the (S,G) entry is empty, performs operations at block 1006 when the list is empty, or performs operations at block 1007 when the list is not empty.
  • the Rtr updates an aging time of the (S,G) entry, sends a PIM prune message via a port from which the multicast flow is received, and the process is terminated.
  • the upstream neighbor address of the PIM prune message is the IP address of the multicast source, the destination IP address is the IP address of the multicast source and the destination MAC address is the MAC address of the multicast source.
  • the PIM prune message Since the PIM prune message is sent from the port via which the multicast flow enters the Rtr, the PIM prune message will reach the layer-2 exchange between the multicast source and the Rtr.
  • the layer-2 exchange may perform the processing procedures shown in FIG. 5 after receiving the PIM prune message.
  • the Rtr forwards the multicast flow to external devices according to egress port information in the egress port list, and the process is terminated.
  • the Rtr establishes an (S,G) entry corresponding to the multicast flow, and sets an aging time for the (S,G) entry.
  • the aging time of the (S,G) entry is generally configured as three minutes.
  • the Rtr determines whether the Rtr is a DR, and performs operations at block 1011 when the Rtr is a DR, or performs operations at block 1010 when the Rtr is not a DR.
  • the Rtr performs no further processing, and the process is terminated.
  • the Rtr sends a source register message for the multicast flow to an RP.
  • the Rtr receives a source register stop message for the multicast flow returned by the RP, determines whether an egress port list of the (S,G) entry corresponding to the multicast flow is empty, and performs operations at block 1013 when the list is empty, or performs operations at block 1014 when the list is not empty.
  • the RP may first return a PIM join message for the multicast flow to the Rtr when determining there is a receiver of the multicast flow, and sends a source register stop message for the multicast flow to the Rtr.
  • the Rtr adds the port from which the message is received into an egress port list of an (S,G) entry corresponding to the multicast flow.
  • the RP may directly return a source register stop message for the multicast flow to the Rtr.
  • the Rtr sends a PIM prune message to external devices via the port from which the multicast flow is received, and the process is terminated.
  • the upstream neighbor address of the PIM prune message is the IP address of the multicast source, the destination IP address is the IP address of the multicast source and the destination MAC address is the MAC address of the multicast source.
  • the PIM prune message Since the PIM prune message is sent from the port via which the multicast flow enters the Rtr, the PIM prune message will reach the one or multiple layer-2 exchanges between the multicast source and the Rtr.
  • the layer-2 exchange may perform the processing procedures shown in FIG. 5 after receiving the PIM prune message.
  • the Rtr forwards the multicast flow to external devices according to egress port information in the egress port list.
  • the processing procedures of the multicast flow by the first hop PIM router are the same as that of a first hop PIM router that adopts PIM-SM and is not a DR when receiving a multicast flow.
  • the first hop PIM router adopts PIM-SM or bi-directional PIM, and the first hop PIM router may send a PIM join message in the direction of the multicast source for each (S,G) entry established in the first hop PIM router when the first hop PIM router becomes a DR from a non-DR.
  • the processing procedures of the first hop PIM router are the same with that of a first hop PIM router adopting PIM-SSM, as in the example shown in FIG. 4 .
  • the processing procedures of the first hop PIM router are the same as that of a first hop PIM router adopting PIM-SSM, as in the example shown in FIG. 6 .
  • the processing procedures of the first hop PIM router are the same as that of a first hop PIM router adopting PIM-SSM, as in the example shown in FIG. 8 .
  • FIG. 11 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-DM after receiving a multicast flow according to an example. As shown in FIG. 11 , the process may include the following operations.
  • the first hop PIM router (Rtr) periodically sends a PIM hello message via each PIM port of the first hop PIM.
  • a layer-2 exchange receives the PIM hello message, sets a port from which the message is received as a router port by utilizing IGMP snooping functions, and forwards the PIM hello message via each port of the layer-2 exchange to other layer-2 exchanges.
  • Other layer-2 exchanges may also perform the operations at block 1102 after receiving the PIM hello message.
  • a multicast source sends a multicast flow, and the multicast flow is forwarded to a first hop PIM Rtr via each router port.
  • the Rtr judges whether the Rtr has established an
  • (S,G) entry corresponding to the multicast flow performs operations at block 1105 when the entry has been established, or performs operations at block 1106 when the entry has not been established.
  • the Rtr updates an aging time of the (S,G) entry, and operations at block 1107 are performed.
  • the Rtr establishes an (S,G) entry for the multicast flow, sets an aging time for the (S,G) entry, and forwards the multicast flow to all downstream PIM neighbors of the Rtr; after receiving a PIM prune message returned by a downstream PIM neighbor, adds the port from which the PIM prune message is received into an egress port list in the (S,G) entry as a prune port; after receiving a PIM graft message from a downstream PIM neighbor, adds the port from which the PIM graft message is received into an egress port list in the (S,G) entry as a forwarding port.
  • the above operations are performed until all of the ports connected to downstream PIM neighbors are added into the (S,G) entry.
  • the aging time of the (S,G) entry is generally configured as three minutes.
  • the Rtr judges whether all egress ports in the (S,G) entry are prune ports, performs operations at block 1108 when all egress ports are prune ports, or performs operations at block 1109 when all egress ports are not prune ports.
  • the Rtr sends a PIM prune message to external devices via the port from which the multicast flow is received, and the process is terminated.
  • the upstream neighbor address of the PIM prune message is the IP address of the multicast source, the destination IP address is the IP address of the multicast source and the destination MAC address is the MAC address of the multicast source.
  • the PIM prune message Since the PIM prune message is sent from the port via which the multicast flow enters the Rtr, the PIM prune message will reach the one or multiple layer-2 exchanges between the multicast source and the Rtr.
  • the layer-2 exchange may perform the processing procedures shown in FIG. 5 after receiving the PIM prune message.
  • the Rtr forwards the multicast flow via each forwarding egress port in the (S,G) entry.
  • FIG. 12 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-DM after receiving a PIM graft message from a PIM neighbor according to an example. As shown in FIG. 12 , the process may include the following operations.
  • a Rtr receives a PIM graft message for a multicast flow from a PIM neighbor, and searches in the Rtr for an (S,G) entry corresponding to the multicast flow.
  • the Rtr judges whether a list of egress ports in the (S,G) entry is empty, performs operations at block 1203 when the list is empty, or performs operations at block 1204 when the list is not empty.
  • the Rtr adds the port from which the PIM graft message is received into an egress port list of the (S,G) entry, searches in a unicast routing table for an entry corresponding to the destination IP address of the message, sends a PIM join message through an egress port in the unicast routing table entry, and the process is terminated.
  • the destination IP address of the PIM join message is the IP address of the multicast source and the destination MAC address is the MAC address of the multicast source.
  • the PIM join message may be forwarded to the multicast source through layer-2 exchanges between the Rtr and the multicast source.
  • the processing procedures of the PIM join message by a layer-2 exchange may be as shown in FIG. 9 .
  • the Rtr may send the PIM join message at a high frequency until the multicast flow is received.
  • the Rtr processes the PIM graft message according to a current PIM protocol.
  • the processing procedures of the first hop PIM router are the same as those of a first hop PIM router adopting PIM-SSM, as in the example shown in FIG. 4 .
  • the processing procedures of the first hop PIM router are the same as those of a first hop PIM router adopting PIM-SSM, as in the example shown in FIG. 8 .
  • FIG. 13 is a schematic illustrating a structure of a PIM router provided by an example.
  • the PIM router is a first hop PIM router, is connected to a multicast source via a layer-2 exchange having PIM snooping functions.
  • the PIM router may include: a first module and a second module.
  • the first module is to receive a multicast flow initiated from the multicast source, to delete the port from which a PIM prune message or a multicast group leave message is received from an egress port list of the multicast flow after receiving the PIM prune message from a downstream PIM router for the multicast flow or after receiving the multicast group leave message from a client connected to the PIM router, to determine whether the multicast flow is to be received, and to send a prune indication to the second module in response to a determination that the multicast flow is not to be received.
  • the multicast group leave message is an IGMP leave message or an MLD leave message.
  • the second module is to receive the prune indication, and to send a PIM prune message via the port from which the multicast flow is received.
  • the first module may include the following sub modules.
  • a first sub module is to receive the multicast flow and send information of the multicast flow to a second sub module.
  • the second sub module is to receive the information of the multicast flow from the first sub module, to determine that the multicast flow is not to be received and to send the prune indication to the second module when a determination that a multicast routing table entry has not been established for the multicast flow in the PIM router is made or when a determination that a multicast routing table entry has been established for the multicast flow but an egress port list of the multicast routing table entry is empty is made.
  • the first module may include the following sub modules.
  • a first sub module is to receive the multicast flow and send information of the multicast flow to a second sub module.
  • the second sub module is to receive the information of the multicast flow from the first sub module, to determine that the multicast flow is not to be received and to send the prune indication to the second module when a determination that a multicast routing table entry has been established for the multicast flow but an egress port list of the multicast routing table entry is empty is made; or to establish a multicast routing table entry for the multicast flow and to send a source register message to an RP when a determination that a multicast routing table entry has not been established for the multicast flow is made, to determine that the multicast flow is not to be received and to send the prune indication to the second module after receiving a source register stop message from the RP and determining that an egress port list of the multicast routing table entry is empty.
  • the first module may include the following sub modules.
  • a first sub module is to receive the multicast flow and send information of the multicast flow to a second sub module.
  • the second sub module is to receive the information of the multicast flow from the first sub module, to determine that the multicast flow is not to be received and to send the prune indication to the second module when determining a multicast routing table entry has been established for the multicast flow but all egress ports in the multicast routing table entry are prune ports; or to establish a multicast routing table entry for the multicast flow and to forward the multicast flow to all downstream PIM neighbors when a determination that a multicast routing table entry has not been established for the multicast flow is made; to receive a PIM prune message from a downstream PIM neighbor and to add the port from which the PIM graft message is received into an egress port list of the multicast routing table entry as a prune port; to receive a PIM graft message from a downstream PIM neighbor and to add the port from which the PIM graft message is received into an egress port list of the multicast routing table entry as a forwarding port; to determine that the multicast flow is not to be received and to send the prune indication to the
  • the first module may also include: a third module, to receive a PIM join message for the multicast flow from a downstream PIM router or a multicast group join message from a client connected to the PIM router, and to send a PIM join message in the direction of the multicast source.
  • the third module is further to determine whether a multicast routing table entry corresponding to the multicast flow has been established in the PIM router after receiving a PIM join message for the multicast flow from a downstream PIM router, to add the port from which the PIM join message is received into an egress port list of the multicast routing table entry and to send a PIM join message in the direction of the multicast source when a determination that the egress port list of the multicast routing table entry is empty is made.
  • the PIM router may also include: a fourth module, to receive a multicast group join message for the multicast flow from a client connected to the PIM router, and to send a PIM join message in the direction of the multicast source.
  • the fourth module is further to determine whether a multicast routing table entry corresponding to the multicast flow has been established in the PIM router after receiving a multicast group join message for the multicast flow from a client connected to the PIM router, to add the port from which the multicast group join message is received into an egress port list of the multicast routing table entry and to send a PIM join message in the direction of the multicast source when a determination that the multicast routing table entry has been established and the egress port list of the multicast routing table entry is empty is made.
  • the PIM router may also include: a fifth module, to send, for a multicast routing table entry established for each multicast flow, a PIM join message for the multicast flow in the direction of the multicast source when the PIM router was not a DR and becomes a DR.
  • the PIM router may also include: a sixth module, to receive a PIM graft message for the multicast flow from a downstream PIM neighbor, and to send a PIM join message in the direction of the multicast source.
  • the sixth module is further to judge whether a multicast routing table entry corresponding to the multicast flow has been established in the PIM router after receiving a PIM graft message for the multicast flow from a downstream PIM neighbor, to add the port from which the PIM graft message is received into an egress port list of the multicast routing table entry and to send a PIM join message in the direction of the multicast source when determining the multicast routing table entry has been established and the egress port list of the multicast routing table entry is empty.
  • the exchange is deployed between a multicast source and a first hop PIM router.
  • the exchange may mainly include a first module, a second module and a third module.
  • the first module is to receive a PIM prune message for a multicast flow, to add a port from which the PIM prune message is received into a PIM snooping entry corresponding to the multicast flow as a prune port and to stop forwarding the multicast via the prune port when a determination that the upstream neighbor address in the message is not in a list of PIM routers which are maintained by PIM snooping functions of the exchange is made.
  • the first module may further set a prune time for a prune port, and begin forwarding the multicast flow via the prune port when the prune time expires.
  • the first module may further set a lifetime value that is smaller than the lifetime value of the multicast routing table entry of the multicast flow corresponding to the PIM prune message in the first hop PIM router; set the prune port as a temporary router port when the lifetime value of the prune port expires, and set the temporary router port as a router port if a PIM prune message for the multicast flow is not received within a pre-defined period of time, or set the temporary router port as a prune port and reset the lifetime value of the prune port if a PIM prune message for the multicast flow is received.
  • the first module may further establish a PIM snooping entry for the multicast flow when determining a PIM snooping entry has not been established for the multicast flow in the exchange, set an empty list as an upstream neighbor list of the PIM snooping entry, add all PIM neighbor ports except upstream ports of the exchange into an egress port list in the PIM snooping entry, add the prune port into the PIM snooping entry of the multicast flow; determine whether the multicast flow is to be forwarded based on PIM snooping entries and multicast group management entries in the exchange, and not forwarding the PIM prune message if the multicast flow is to be forwarded, or forwarding the PIM prune message in the direction of the multicast source if the multicast flow is not to be forwarded.
  • the first module may directly add the prune port into the PIM snooping entry of the multicast flow when determining the PIM snooping entry has been established for the multicast flow; determine whether the multicast flow is to be forwarded based on PIM snooping entries and multicast group management entries in the exchange, and not forwarding the PIM prune message if the multicast flow is to be forwarded, or forwarding the PIM prune message in the direction of the multicast source if the multicast flow is not to be forwarded.
  • the multicast group snooping entry is an IGMP snooping entry.
  • the multicast group snooping entry is an MLD snooping entry.
  • the second module is to receive a PIM join message for a multicast flow.
  • a determination is made as to whether there is another port other than the port from which the PIM join message is received is to receive the multicast flow based on PIM snooping entries and multicast group management snooping entries in the exchange when a determination is made that there is a PIM snooping entry for the multicast flow corresponding to the PIM join message in the exchange and the port receiving the PIM join message is a prune port in the PIM snooping entry, the PIM join message is not forwarded when there is another port requiring receipt of the multicast flow, or the PIM join message is forwarded in the direction of the multicast source if there is no other port requiring receipt of the multicast flow.
  • the second module may further delete the port receiving the PIM join message from the PIM snooping entry after forwarding the PIM join message in the direction of the multicast source, and set the port as a router port.
  • the third module is to receive a multicast group management join message for a multicast flow, add the port receiving the message into a multicast group management entry of the multicast flow as a membership port, and forward the multicast group management join message via all router ports, prune ports and upstream neighbors in the PIM snooping entry except the port from which the message is received.
  • the multicast group management join message may be an IGMP join message or an MLD join message.
  • FIG. 14 is a schematic diagram illustrating a structure of a PIM router provided by another example.
  • the PIM router is a first hop PIM router, and may be connected to a multicast source via a layer-2 exchange having PIM snooping functions.
  • the PIM router may include: a first module, a second module, and a processor.
  • the first module and the second module may be stored in storage medium readable by the processor to cause the processor to perform similar functions as the first module and the second module shown in FIG. 13 .
  • a machine-readable storage medium is also provided, which is to store instructions to cause a machine to execute a control method as disclosed herein.
  • a system or apparatus having a storage medium which stores machine-readable instructions which may be read and executed by one or more processors (e.g. a CPU or MPU etc) of the system or apparatus to implement the methods and functions described in the above examples.
  • processors e.g. a CPU or MPU etc
  • the machine readable instructions e.g. program codes
  • the storage medium may implement any one of the above examples, thus the machine readable instructions and the storage medium storing the machine readable instructions are part of the technical scheme.
  • the storage medium for providing the machine readable instructions may include a floppy disk, hard drive, magneto-optical disk, compact disk (such as CD-ROM, CD-ft CD-RW, DVD-ROM, DVD-RAM, DVD-RW, DVD+RW), magnetic tape drive, Flash card, ROM and so on.
  • the machine readable instructions may be downloaded from a server computer via a communication network.
  • machine readable instructions being executed by a computer
  • at least part of the operations performed by the machine readable instructions may be implemented by an operation system running in a computer following instructions based on the machine readable instructions to realize the technical scheme of any of the above examples.
  • machine readable instructions implemented from a storage medium may be written in a storage in an extension board inserted in the computer or in a storage in an extension unit connected to the computer.
  • a CPU in the extension board or the extension unit executes at least part of the operations according to the instructions based on the machine readable instructions to realize the technical scheme of any of the above examples.

Abstract

According to an example, a multicast source may be connected to a first hop Protocol Independent Multicast (PIM) router via one or multiple layer-2 switches that has PIM functions. A first hop PIM router may receive a multicast flow initiated by the multicast source, send a PIM prune message via a port from which the multicast flow is received in response to a determination that the multicast flow is not to be received, or the first hop PIM router may receive a PIM prune message for a multicast flow from a downstream PIM router or a multicast group leave message for a multicast flow from a client connected to the first hop PIM router and delete a port via which the PIM prune message.

Description

    BACKGROUND
  • For facilitating understanding, the following concepts are first explained.
  • Multicast: a communication manner in contrast with unicast and broadcast. A multicast system includes a multicast source, one or multiple receivers and a multicast group. The source host sends data only once, and the destination address of the data is the address of the multicast group. Each receiver in the multicast group receives a copy of the data, and only the receivers in the multicast group can receive the data.
  • IGMP (Internet Group Management Protocol): a protocol for managing IP multicast members in the TCP/IP (Transmission Control Protocol/Internet Protocol) protocol family, which is for establishing and maintaining relations of multicast group members between an IP host and adjacent multicast routers.
  • IGSP (Internet Group Management Protocol Snooping): a multicast restriction scheme running in layer-2 devices, which is for managing and controlling multicast groups. A layer-2 device which runs IGMP snooping analyzes a received IGMP packet, establishes a mapping relation between a port and a multicast MAC (Media Access Control) address, and forwards multicast data according to the mapping relation.
  • PIM: a protocol which provides IP multicast routing by utilizing a unicast routing table established using static routing or any unicast routing protocol such as RIP, OSPF, IS-IS, BGP and so on, and is for maintaining propagation of multicast data between layer-three devices. PIM protocol has four modes, i.e., PIM-DM (Dense Mode), PIM-SM (Spare Mode), PIM-SSM (Source-Specific Multicast) and bi-directional PIM.
  • IP multicast techniques effectively solve problems existing in one-to-many transmissions, implement efficient one-to-many data transmission in an IP network, and can save a large amount of network bandwidth and reduce network loads. Some new value-added services, including Internet information services, such as online live broadcast, IPTV, remote education, Telemedicine, internet radio, real-time video conference, and so on, are able to gain greater development by taking advantage of the multicast functions of the network.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic diagram illustrating a structure of a multicast network.
  • FIG. 2 is a flowchart illustrating a method for pruning a multicast branch according to an example.
  • FIG. 3 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SSM after receiving a multicast flow according to an example.
  • FIG. 4 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SSM after receiving a PIM prune message from a downstream PIM router or an IGMP leave message from a client served by the first hop PIM router according to an example.
  • FIG. 5 is a flowchart illustrating a process performed by a layer-2 exchange after receiving a PIM prune message according to an example.
  • FIG. 6 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SSM after receiving a PIM join message from a downstream PIM router according to an example.
  • FIG. 7 is a flowchart illustrating a process performed by a layer-2 exchange after receiving a PIM join message according to an example.
  • FIG. 8 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SSM after receiving an IGMP join message according to an example.
  • FIG. 9 is a flowchart illustrating a process performed by a layer-2 exchange after receiving a PIM join message according to an example.
  • FIG. 10 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SM after receiving a multicast flow according to an example.
  • FIG. 11 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-DM after receiving a multicast flow according to an example.
  • FIG. 12 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-DM after receiving a PIM graft message from a PIM neighbor according to an example.
  • FIG. 13 is a schematic diagram illustrating a structure of a PIM router according to an example.
  • FIG. 14 is a schematic diagram illustrating a structure of a PIM router according to an example.
  • DETAILED DESCRIPTION OF EXAMPLES
  • The PIM protocol is the currently prevailing multicast routing protocol in use today. IGMP snooping and PIM snooping are also commonly adopted layer-2 multicast control protocols. PIM snooping, whose importance is only below that of IGMP snooping, is for snooping PIM hello messages, PIM join messages, and PIM prune messages to control the forwarding of a multicast flow to intended routers. PIM snooping exchanges, however, may produce positive outcomes only when deployed between PIM routers, but may not achieve the same outcomes when deployed between a multicast source and a PIM router.
  • Regarding multicast applications that operate under a mechanism similar to that of VOD (Video On Demand), traffic control at the multicast source side remains a problem to be solved in the industry. FIG. 1 is a schematic diagram illustrating a structure of a multicast network. As shown in FIG. 1, a multicast source accesses the network via one or more layer-2 exchanges, and a client accesses the network via a layer-2 exchange or a PIM router. In addition, multiple layer-2 exchanges converge at a PIM router. For example, multicast sources 1 and 2 access the network respectively via layer-2 exchanges 5 and 6, and layer-2 exchanges 1 and 2 converge at PIM router 2.
  • When a multicast flow initiated from a multicast source reaches a first hop PIM router via one or multiple exchanges, the PIM router may send a source register message to an RP (Rendezvous Point) if the PIM router is a DR (Designated Router). When the RP detects that an (S,G) entry corresponding to the multicast flow, i.e., an entry recording the source address and group address of the multicast flow, has not been established in the RP, which indicates no client subscribes to the multicast flow, the RP sends a source quench message to the DR. After that, when a client subscribes to the multicast flow, the client sends an IGMP join message to a leaf router, and the leaf router sends a PIM join message to the RP. After receiving the PIM join message, the RP sends a PIM join message to the DR, and subsequently, the multicast flow reaches the multicast receiver via the RP.
  • The first hop PIM router refers to the first PIM router encountered by the multicast flow from the multicast source. The RP is a PIM router providing centralized management of multicast flow information, and acts as a medium between multicast sources and multicast receivers.
  • In conventional networks, a multicast flow from a multicast source, whether subscribed to or not by any clients, is first sent to a first hop PIM router via one or multiple exchanges, which increases cache memory consumption in the exchanges. Cache memory for egress ports of an exchange plays an important role in keeping service flows, especially those with bursts such as videos and so on, in order, in preventing packet loss and in reducing jitter. Therefore, forwarding of data flows whose forwarding is not necessary should be prevented to reduce the consumption of cache memory for egress ports of an exchange. Current protocols, however, cannot prune off unnecessary multicast flows between a multicast source and a PIM router on the data link layer.
  • Some examples will be described in detail with reference to accompanying drawings.
  • In some examples, it is assumed that the whole network adopts the same version of a multicast group management protocol, e.g., adopts one of IGMPv2, IGMPv3, MLDv1 (Multicast Listener Discovery Protocol Version 1) and MLDv2.
  • When IGMPv2 or MLDv1 is adopted in this example, a multicast flow is identified by a multicast group identification. However, when IGMPv3 or MLDv2 is adopted, a multicast flow is identified by a multicast source identification+a multicast group identification.
  • In some examples, the adopted PIM protocol is PIM-SSM or PIM-DM. When PIM-SSM is adopted, the adopted IGMP version is IGMPv3, in which the IGSP version is IGMPv3 snooping.
  • In some examples, a layer-2 exchange with PIM snooping functions has a new role for ports, i.e., prune ports. When a layer-2 exchange with PIM snooping functions receives a PIM prune message from a first hop PIM router for a multicast flow, the port receiving the message is set as a prune port. Afterwards, the multicast flow is prohibited from being forwarded to the prune port.
  • A layer-2 exchange supporting multicast has four roles for ports, i.e., router ports and membership ports for IGMP snooping, prune ports and upstream ports for PIM snooping. A router port is a downstream port, i.e., a port receiving a PIM join message. The downstream ports are called router ports because they perform the same functions, i.e., connecting routers, forwarding all multicast flows.
  • The four roles of the ports are maintained respectively with respect to each other. When a port plays all or any two of three roles of a membership port, a prune port, and a router port at the same time, the priority order of the roles are membership port, prune port and router port in a descending order of priority. For layer-2 forwarding table entries, i.e., PIM snooping entries and IGMP snooping entries, a rule of processing such a port includes: adding the port into the entries when the role with the highest priority of the port is a membership port, and not adding the port to the entries when the role with the highest priority of the port is a prune port. In addition, if the only role of a port is a router port, it is assumed that the role with the highest priority of the port is a router port, and the port is added into the layer-2 forwarding table entries.
  • If an upstream neighbor list in a PIM snooping table entry of a layer-2 exchange is empty, no upstream port of the layer-2 exchange should be added into a downstream egress port list in the PIM snooping table entry. A PIM snooping table entry includes: an (S,G) entry, an upstream neighbor list, a down stream neighbor list, and so on.
  • The following example adopts IGMP as its multicast group management protocol. It should be understood that when MLD protocol is adopted, replacement of all “IGMP” in the following description with “MLD” is only required.
  • FIG. 2 is a flowchart illustrating a method for pruning a multicast branch according to an example. As shown in FIG. 2, the method may include the following operations.
  • At block 201, a layer-2 exchange receives a PIM hello message from a PIM router, sets a port from which the message is received as a router port by utilizing IGMP snooping functions, and maintains a PIM router list according to the message by utilizing PIM snooping functions. Each entry of the PIM router list includes: an address of a PIM router sending a PIM hello message and a port number of the port connecting the layer-2 exchange with the PIM router.
  • The address of the PIM router sending the PIM hello message may be obtained from a source address field in the PIM hello message. The port number of the port connecting the layer-2 exchange with the PIM router refers to the port number from which the PIM hello message is received by the layer-2 exchange.
  • In a PIM router, a port adopting a PIM protocol may send a PIM hello message at intervals to an external device.
  • After receiving the PIM hello message, the layer-2 exchange may forward the message to other layer-2 exchanges, and other layer-2 exchanges also perform the operations at block 201 after receiving the message.
  • At block 202, when a multicast flow initiated from a multicast source reaches a first hop PIM router via a router port, the first hop PIM router sends a PIM prune message for the multicast flow via the port from which the multicast flow is received when a determination that receipt of the multicast flow is not required is made.
  • At block 203, when the first hop PIM router receives a PIM prune message for a multicast flow from a downstream PIM router or receives an IGMP leave message for a multicast flow from a client connected to the first hop PIM router, the first hop PIM router searches in a multicast routing table for an entry corresponding to the multicast flow, deletes the port from which the multicast flow is received from the entry, and sends a PIM prune message for the multicast flow via the port from which the multicast flow is received when a list of egress ports in the entry is empty.
  • The frequency at which the PIM prune message is sent at blocks 202 and 203 is restricted, i.e., the PIM prune message will not be repetitively sent within a short time when the same multicast flow is continuously received. The default time interval between each transmission of the PIM prune message is one minute. The transmission of the PIM prune message is stopped when the branch of the multicast flow is pruned off or a new demand for the multicast flow is received from local clients.
  • At block 204, a layer-2 exchange between the first hop router and the multicast source receives the PIM prune message, sets a port from which the PIM prune message is received as a prune port when detecting an upstream neighbor address in the message is not in a list of PIM routers maintained by the PIM snooping functions of the layer-2 exchange, and stops forwarding the multicast flow via the prune port.
  • From FIG. 2 it may be seen that a multicast flow between a multicast source and a first hop PIM router is pruned off when:
  • 1. there is no demand for receipt of the multicast flow;
  • 2. there was a demand for receipt of the multicast flow, but at the moment a request to stop receipt of the multicast flow has been received.
  • FIG. 3 and FIG. 4 respectively illustrate detailed processing procedures of the above two types of multicast flow by a first hop PIM router adopting PIM-SSM.
  • FIG. 3 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SSM after receiving a multicast flow according to an example. As shown in FIG. 3, the process may include the following operations.
  • At block 301, the first hop PIM router (Rtr) periodically sends a PIM hello message via each PIM port of the first hop PIM.
  • At block 302, a layer-2 exchange receives the PIM hello message, sets a port from which the message is received as a router port by utilizing IGMP snooping functions, and forwards the PIM hello message via each port of the layer-2 exchange to other layer-2 exchanges.
  • IGMP snooping is the common characteristic of all layer-2 exchanges supporting multicast. An exchange with IGMP snooping functions regards a port from which an IGMP general query message or a PIM packet is received as a router port, and regards a port from which an IGMP join message is received as a membership port. An exchange with IGMP snooping functions may send all received multicast flows to a router port, and send a multicast flow of a multicast group only to a membership port.
  • Other layer-2 exchanges may also perform the operations at block 302 after receiving the PIM hello message.
  • At block 303, a multicast source initiates a multicast flow, and the multicast flow is forwarded to a first hop PIM router (Rtr) via each router port.
  • At block 304, the Rtr determines whether the Rtr has established an (S,G) entry corresponding to the multicast flow, and performs operations at block 305 when the entry has been established, or performs operations at block 308 when the entry has not been established.
  • At block 305, the Rtr determines whether a list of egress ports in the (S,G) entry is empty, performs operations at block 306 when the list is empty, or performs operations at block 307 when the list is not empty.
  • At block 306, the Rtr updates an aging time of the (S,G) entry, sends a PIM prune message via a port from which the multicast flow is received, and the process is terminated.
  • The upstream neighbor address of the PIM prune message is the IP address of the multicast source, the destination IP address is the IP address of the multicast source and the destination MAC address is the MAC address of the multicast source.
  • Since the PIM prune message is sent from the port via which the multicast flow enters the Rtr, the PIM prune message will reach a layer-2 exchange between the multicast source and the Rtr. The layer-2 exchange may perform the processing procedures shown in FIG. 5 after receiving the PIM prune message.
  • At block 307, the Rtr forwards the multicast flow to external devices according to egress port information in the egress port list, and the process is terminated.
  • At block 308, the Rtr establishes an (S,G) entry for the multicast flow, configures an aging time for the entry, and sends a PIM prune message to an external device via the port from which the multicast flow is received.
  • The aging time of the (S,G) entry is generally configured as three minutes.
  • The upstream neighbor address of the PIM prune message is the IP address of the multicast source, the destination IP address is the IP address of the multicast source and the destination MAC address is the MAC address of the multicast source.
  • If PIM-SM is adopted, in this block, the Rtr may further send a source register message for the multicast flow to an RP.
  • FIG. 4 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SSM after receiving a PIM prune message from a downstream PIM router or an IGMP leave message from a client connected to the first hop PIM router according to an example. As shown in FIG. 4, the process may include the following operations.
  • At block 401, the first hop PIM router (Rtr) receives a PIM prune message sent by a downstream PIM router for a multicast flow or an IGMP leave message sent by a client connected to the Rtr for a multicast flow, searches for an (S,G) entry corresponding to the multicast flow, and processes the (S,G) entry according to the PIM protocol.
  • When a multicast receiver ceases to receive a multicast flow, the multicast receiver may send an IGMP leave message for the multicast flow to a leaf router of the multicast receiver. The leaf router sends a PIM prune message to an RP for the multicast flow after receiving the IGMP leave message. The RP forwards the PIM prune message in the direction of the first hop PIM router.
  • According to a current PIM protocol, the Rtr generally deletes a port from which the PIM prune message is received from a list of egress ports in the (S,G) entry.
  • At block 402, the Rtr determines whether an egress port list in the (S,G) entry is empty, performs operations at block 403 when the list is empty, or performs operations at block 404 when the list is not empty.
  • At block 403, the Rtr sends the PIM prune message to an external device via the port from which the multicast flow is received, and the process is terminated.
  • The upstream neighbor address of the PIM prune message is the IP address of the multicast source, the destination IP address is the IP address of the multicast source and the destination MAC address is the MAC address of the multicast source.
  • Since the PIM prune message is sent from the port via which the multicast flow enters the Rtr, the PIM prune message will reach the layer-2 exchange between the multicast source and the Rtr. The layer-2 exchange may perform the processing procedures shown in FIG. 5 after receiving the PIM prune message.
  • At block 404, the Rtr performs no further operations.
  • The PIM prune message sent by the first hop PIM router will reach the one or multiple layer-2 exchanges between the multicast source and the first hop PIM router. FIG. 5 is a flowchart illustrating a process performed by a layer-2 exchange after receiving a PIM prune message according to an example. As shown in FIG. 5, the process may include the following operations.
  • At block 501, a layer-2 exchange receives a PIM prune message for a multicast flow.
  • At block 502, the layer-2 exchange determines whether the upstream neighbor address in the PIM prune message is in a list of PIM routers that are maintained by PIM snooping functions of the layer-2 exchange, performs operations at block 503 if the upstream neighbor address is in the list, or performs operations at block 504 if the upstream neighbor address is not in the list.
  • At block 503, the layer-2 exchange performs processing according to a current PIM snooping protocol, and the process is terminated.
  • If the upstream neighbor address in the PIM prune message is in the list of PIM routers maintained by PIM snooping functions, which is an indication that the layer-2 exchange is deployed between PIM routers, the processing according to current PIM snooping protocol is performed. Otherwise, this is an indication that the layer-2 exchange is deployed between the multicast source and the first hop PIM router, thus the processing according to an example is adopted, i.e., operations at blocks 504 to 509.
  • At block 504, the layer-2 exchange determines whether there is a PIM snooping entry for the multicast flow in the layer-2 exchange, performs operations at block 505 when there is the PIM snooping entry, or performs operations at block 506 when there is no such PIM snooping entry.
  • At block 505, the layer-2 exchange adds the port from which the PIM prune message is received into a list of downstream egress ports in the PIM snooping entry, marks the port as a prune port, and performs operations at block 507.
  • At block 506, the layer-2 exchange generates a PIM snooping table entry according to the PIM prune message. The upstream port in the PIM snooping entry is set to be an egress port found in a unicast destination MAC table entry according to the destination MAC address of the PIM prune message. The upstream neighbor list is empty. The port from which the PIM prune message is received is added into a downstream egress port list in the entry, and is marked as a prune port. All PIM neighbor ports except the upstream ports are added into the downstream egress port list in the PIM snooping table entry.
  • As for an arbitrary multicast flow, if a PIM snooping table entry has not been established for the multicast flow, the layer-2 exchange forwards the multicast flow via all PIM neighbor ports except upstream ports by default. Therefore, at this block, after a PIM snooping table entry is established for the multicast flow, all PIM neighbor ports except the upstream ports and marked prune ports are added into the downstream egress port list of the PIM snooping table entry in order to guarantee that the multicast flow will be forwarded to all PIM neighbor ports except the upstream ports when the multicast flow is subsequently received.
  • At block 507, the layer-2 exchange determines whether it is necessary to forward the multicast flow corresponding to the PIM prune message according to PIM snooping table entries and IGMP snooping table entries in the layer-2 exchange, i.e., determining whether there is a PIM snooping table entry or an IGMP snooping table entry having a port whose role of the highest priority is membership port or router port, and performs operations at block 508 if there is, or performing operations at block 509 if there is not.
  • At block 508, the layer-2 exchange does not forward the PIM prune message, and the process is terminated.
  • At block 509, the layer-2 exchange searches in unicast destination MAC table entries for an egress port according to a unicast destination MAC address of the PIM prune message, and forwards the PIM prune message via the egress port.
  • The PIM prune message then reaches the multicast source.
  • In this example, a lifetime value may be set for a prune port in a PIM snooping table entry. The lifetime value of a prune port may be ⅓ of the lifetime value of the (S,G) entry of the multicast flow in the PIM router, e.g., one minute by default. Therefore, a PIM DR may receive the multicast flow every one minute. When the lifetime value of prune ports expires, all the prune ports in a PIM snooping entry may temporarily be set as router ports to have the multicast flow forwarded through the ports. If no PIM prune message for the multicast flow is received from a port within a pre-defined time period from the time the lifetime value of the prune port expires, the port is formally set as a router port. Then, a determination as to whether there are other prune ports in the PIM snooping table entry is made, and the PIM snooping table entry is deleted if there are no other prune ports to save entry resources. If any PIM prune message for the multicast flow is received from the port within the pre-defined time period from the time the lifetime value expires, the port is set as a prune port, and the lifetime value of the prune port is reset.
  • Subsequently, if a device subscribes to a multicast flow whose branch has been pruned off, a branch may be grafted to the multicast flow. A branch should be grafted between a multicast source and a first hop PIM router for a multicast flow that satisfies any of the following three conditions:
  • 1. when a client connected to a downstream PIM router subscribes to the multicast flow, the client may send an IGMP join message to the downstream PIM router, and the downstream PIM router may send a PIM join message to the first hop PIM router after receiving the IGMP join message;
  • 2. when a client connected to the layer-2 exchange subscribes to the multicast flow, the client may send an IGMP join message to the layer-2 exchange;
  • 3. when a client connected to the first hop PIM router subscribes to the multicast flow, the client may send an IGMP join message to the first hop PIM router.
  • A few exemplary processing procedures in connection with grafting a branch for a multicast flow will be described hereinafter.
  • FIG. 6 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SSM after receiving a PIM join message from a downstream PIM router according to an example. As shown in FIG. 6, the process may include the following operations.
  • At block 601, a first hop PIM router (Rtr) receives a PIM join message for a multicast flow from a downstream PIM router, searches for an (S,G) entry corresponding to the multicast flow in the first hop PIM router.
  • When the downstream PIM router of the first hop PIM router is connected to a client, and as shown in FIG. 1, PIM router 2 is a first hop PIM router, PIM router 1 is a downstream PIM router of PIM router 2 and PIM router 1 is connected to client 1. When the client subscribes to a multicast flow, the client may send an IGMP join message for the multicast flow to the downstream PIM router. The downstream PIM router may send a PIM join message for the multicast flow to the first hop PIM router, e.g., the PIM router 2, after receiving the IGMP join message.
  • At block 602, the Rtr determines whether a list of egress ports in the (S,G) entry is empty, performs operations at block 603 when the list is empty, or performs operations at block 604 when the list is not empty.
  • At block 603, the Rtr adds the port from which the PIM join message is received into an egress port list in the (S,G) entry, searches in a unicast routing table for an entry corresponding to the destination IP address of the message, sends a PIM join message through an egress port in the unicast routing table entry, and then the process is terminated.
  • The destination IP address of the PIM join message is the IP address of the multicast source, the destination MAC address being the MAC address of the multicast source. The PIM join message may be forwarded to the multicast source through one or more layer-2 exchanges between the Rtr and the multicast source. The processing procedures of the PIM join message by a layer-2 exchange may be as shown in FIG. 9.
  • To avoid PIM join message loss and to receive the multicast flow quickly, the Rtr may send the PIM join message at a high frequency until the multicast flow is received.
  • At block 604, the Rtr processes the PIM join message according to a current PIM protocol.
  • FIG. 7 is a flowchart illustrating a process performed by a layer-2 exchange after receiving an IGMP join message according to an example. As shown in FIG. 5, the process may include the following operations.
  • At block 701, a layer-2 exchange receives an IGMP join message for a multicast flow.
  • The IGMP join message is initiated by a client connected to the layer-2 exchange.
  • At block 702, the layer-2 exchange searches in the layer-2 exchange for an IGMP snooping table entry corresponding to the multicast flow, adds a port from which the message is received into the IGMP snooping table entry as a membership port, and forwards the IGMP join message to all router ports, prune ports and upstream neighbors in a PIM snooping table entry except to the port from which the message is received.
  • The IGMP join message may reach other layer-2 exchanges or the first hop PIM router. A processing procedure of the IGMP join message by the other layer-2 exchanges is the same as that in this example. An example of a processing procedure of the IGMP join message by the first hop PIM router is as shown in FIG. 8.
  • FIG. 8 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SSM after receiving an IGMP join message according to an example. As shown in FIG. 8, the process may include the following operations.
  • At block 801, a first hop PIM router (Rtr) receives an IGMP join message for a multicast flow.
  • The IGMP join message may be initiated from the following two types of sources.
  • Source 1: when the first hop PIM router is connected to a client, as shown in FIG. 1, PIM router 2 is the first hop PIM router and is connected to client 2. If the client subscribes to a multicast flow, the client may send an IGMP join message to the first hop PIM router.
  • Source 2: when a layer-2 exchange between the multicast source and the first hop PIM router is connected to a client, as shown in FIG. 1 where PIM router 2 is the first hop PIM router, and layer-2 exchange 1 between PIM router 2 and multicast sources 1 and 2 is connected to client 3. If client 3 subscribes to a multicast flow, client 3 may send an IGMP join message to layer-2 exchange 1. Layer-2 exchange 1 may forward the IGMP join message to the first hop PIM router.
  • At block 802, the Rtr determines whether the Rtr has established an (S,G) entry corresponding to the multicast flow, and performs operations at block 803 when the entry has been established, or performs operations at block 808 when the entry has not been established.
  • At block 803, the Rtr determines whether an egress port list of the (S,G) entry is empty, performs operations at block 804 when the list is empty, or performs operations at block 807 when the list is not empty.
  • At block 804, the Rtr determines whether the IGMP join message is from a port leading to the multicast source, and performs operations at block 805 if the IGMP join message is from the port, or performs operations at block 806 if the IGMP join message is not from the port.
  • The IGMP join message is from a port leading to the multicast source, i.e., the source of the IGMP join message is the Source 2 at block 801, thus there is no need to add the port receiving the IGMP join message into the egress port list of the (S,G) entry, nor to send a PIM join message.
  • At block 805, the Rtr performs no further processing, and the process is terminated.
  • At block 806, the Rtr adds the port from which the IGMP join message is received into the egress port list of the (S,G) entry, sends a PIM join message for the multicast flow in the direction of the multicast source (S), and the process is terminated.
  • The destination IP address of the PIM join message is the IP address of the multicast source, the destination MAC address being the MAC address of the multicast source. The PIM join message may be forwarded to the multicast source through layer-2 exchanges between the Rtr and the multicast source. The processing procedures of the PIM join message by a layer-2 exchange may be as shown in FIG. 9.
  • To avoid PIM join message loss and to receive the multicast flow quickly, the Rtr may send the PIM join message at a high frequency until the multicast flow is received.
  • At block 807, the Rtr performs processing according to a current PIM protocol, and the process is terminated.
  • According to a current PIM protocol, the Rtr may add the port from which the IGMP join message is received into the egress port list of the (S,G) entry.
  • At block 808, the Rtr performs processing according to a current PIM protocol.
  • According to a current PIM protocol, the Rtr may establish an (S,G) entry corresponding to the multicast flow, and may add the port receiving the IGMP join message into the egress port list of the (S,G) entry.
  • FIG. 9 is a flowchart illustrating a process performed by a layer-2 exchange after receiving a PIM join message according to an example. As shown in FIG. 9, the process may include the following operations.
  • At block 901, a layer-2 exchange receives a PIM join message for a multicast flow.
  • At block 902, the layer-2 exchange determines whether the upstream neighbor address in the PIM join message is in a list of PIM routers which are maintained by PIM snooping functions of the layer-2 exchange, performs operations at block 903 if the upstream neighbor address is in the list, or performs operations at block 904 if the upstream neighbor address is not in the list.
  • At block 903, the layer-2 exchange performs processing according to a current PIM snooping protocol, and then the process is terminated.
  • At block 904, the layer-2 exchange determines whether there is a PIM snooping table entry for the multicast flow in the layer-2 exchange, performs operations at block 905 when a PIM snooping table entry exists, or performs operations at block 906 when no such PIM snooping table entry exists.
  • At block 905, the layer-2 exchange determines whether the port from which the PIM join message is received is a prune port in the PIM snooping table entry, and performs operations at block 907 when the port is a prune port, or performs operations at block 906 when the port is not a prune port.
  • At block 906, the layer-2 exchange performs no further processing, and the process is terminated.
  • At block 907, the layer-2 exchange determines whether there is another port needing to forward the multicast flow except the port receiving the PIM join message according to local PIM snooping table entries and IGMP snooping table entries, and performs operations at block 908 when such a port exists, or performs operations at block 909 when such a port does not exist.
  • At block 908, the layer-2 exchange does not forward the PIM join message, and performs operations at block 910.
  • At block 909, the layer-2 exchange searches in a unicast routing table for an entry according to the destination IP address of the PIM join message, forwards the PIM join message via egress ports in the unicast routing table entry, and performs operations at block 910.
  • At block 910, the layer-2 exchange deletes the mark which labels the receiving port of the PIM join message as a prune port from a downstream egress port list of the PIM snooping table entry, sets the receiving port of the PIM join message as a router port and forwards the multicast flow via the port.
  • At block 911, the layer-2 exchange judges whether the downstream egress port list of the PIM snooping table entry does not include a prune port and the upstream neighbor list is empty, performs operations at block 912 if the downstream egress port list of the PIM snooping table entry does not include a prune port and the upstream neighbor list is empty; otherwise, performs operations at block 913.
  • At block 912, the layer-2 exchange deletes the PIM snooping table entry to save table entry resources, and the process is terminated.
  • At block 913, the layer-2 exchange performs no further processing.
  • FIG. 10 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-SM after receiving a multicast flow according to an example. As shown in FIG. 10, the process may include the following operations.
  • At block 1001, the first hop PIM router (Rtr) periodically sends a PIM hello message via each PIM port of the first hop PIM.
  • At block 1002, a layer-2 exchange receives the PIM hello message, sets a port from which the message is received as a router port by utilizing IGMP snooping functions, and forwards the PIM hello message via each port of the layer-2 exchange to other layer-2 exchanges.
  • Other layer-2 exchanges may also perform the operations at block 1002 after receiving the PIM hello message.
  • At block 1003, a multicast source initiates a multicast flow, and the multicast flow is forwarded to a first hop PIM Rtr via each router port.
  • At block 1004, the Rtr judges whether the Rtr has established an (S,G) entry corresponding to the multicast flow, and performs operations at block 1005 when the entry has been established, or performs operations at block 1008 when the entry has not been established.
  • At block 1005, the Rtr judges whether an egress port list of the (S,G) entry is empty, performs operations at block 1006 when the list is empty, or performs operations at block 1007 when the list is not empty.
  • At block 1006, the Rtr updates an aging time of the (S,G) entry, sends a PIM prune message via a port from which the multicast flow is received, and the process is terminated.
  • The upstream neighbor address of the PIM prune message is the IP address of the multicast source, the destination IP address is the IP address of the multicast source and the destination MAC address is the MAC address of the multicast source.
  • Since the PIM prune message is sent from the port via which the multicast flow enters the Rtr, the PIM prune message will reach the layer-2 exchange between the multicast source and the Rtr. The layer-2 exchange may perform the processing procedures shown in FIG. 5 after receiving the PIM prune message.
  • At block 1007, the Rtr forwards the multicast flow to external devices according to egress port information in the egress port list, and the process is terminated.
  • At block 1008, the Rtr establishes an (S,G) entry corresponding to the multicast flow, and sets an aging time for the (S,G) entry.
  • The aging time of the (S,G) entry is generally configured as three minutes.
  • At block 1009, the Rtr determines whether the Rtr is a DR, and performs operations at block 1011 when the Rtr is a DR, or performs operations at block 1010 when the Rtr is not a DR.
  • At block 1010, the Rtr performs no further processing, and the process is terminated.
  • At block 1011, the Rtr sends a source register message for the multicast flow to an RP.
  • At block 1012, the Rtr receives a source register stop message for the multicast flow returned by the RP, determines whether an egress port list of the (S,G) entry corresponding to the multicast flow is empty, and performs operations at block 1013 when the list is empty, or performs operations at block 1014 when the list is not empty.
  • After receiving the source register message for the multicast flow, the RP may first return a PIM join message for the multicast flow to the Rtr when determining there is a receiver of the multicast flow, and sends a source register stop message for the multicast flow to the Rtr. After receiving the PIM join message, the Rtr adds the port from which the message is received into an egress port list of an (S,G) entry corresponding to the multicast flow. The RP may directly return a source register stop message for the multicast flow to the Rtr.
  • At block 1013, the Rtr sends a PIM prune message to external devices via the port from which the multicast flow is received, and the process is terminated.
  • The upstream neighbor address of the PIM prune message is the IP address of the multicast source, the destination IP address is the IP address of the multicast source and the destination MAC address is the MAC address of the multicast source.
  • Since the PIM prune message is sent from the port via which the multicast flow enters the Rtr, the PIM prune message will reach the one or multiple layer-2 exchanges between the multicast source and the Rtr. The layer-2 exchange may perform the processing procedures shown in FIG. 5 after receiving the PIM prune message.
  • At block 1014, the Rtr forwards the multicast flow to external devices according to egress port information in the egress port list.
  • When the first hop PIM router adopts bi-directional PIM and is not a DR, the processing procedures of the multicast flow by the first hop PIM router are the same as that of a first hop PIM router that adopts PIM-SM and is not a DR when receiving a multicast flow.
  • In addition, the first hop PIM router adopts PIM-SM or bi-directional PIM, and the first hop PIM router may send a PIM join message in the direction of the multicast source for each (S,G) entry established in the first hop PIM router when the first hop PIM router becomes a DR from a non-DR.
  • After the first hop PIM router adopting the PIM-SM receives a PIM prune message from a downstream PIM router or an IGMP leave message from a client connected to the first hop PIM router, the processing procedures of the first hop PIM router are the same with that of a first hop PIM router adopting PIM-SSM, as in the example shown in FIG. 4.
  • After the first hop PIM router adopting the PIM-SM receives a PIM join message from a downstream PIM router, the processing procedures of the first hop PIM router are the same as that of a first hop PIM router adopting PIM-SSM, as in the example shown in FIG. 6.
  • After the first hop PIM router adopting the PIM-SM receives an IGMP join message from a downstream PIM router, the processing procedures of the first hop PIM router are the same as that of a first hop PIM router adopting PIM-SSM, as in the example shown in FIG. 8.
  • FIG. 11 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-DM after receiving a multicast flow according to an example. As shown in FIG. 11, the process may include the following operations.
  • At block 1101, the first hop PIM router (Rtr) periodically sends a PIM hello message via each PIM port of the first hop PIM.
  • At block 1102, a layer-2 exchange receives the PIM hello message, sets a port from which the message is received as a router port by utilizing IGMP snooping functions, and forwards the PIM hello message via each port of the layer-2 exchange to other layer-2 exchanges.
  • Other layer-2 exchanges may also perform the operations at block 1102 after receiving the PIM hello message.
  • At block 1103, a multicast source sends a multicast flow, and the multicast flow is forwarded to a first hop PIM Rtr via each router port.
  • At block 1104, the Rtr judges whether the Rtr has established an
  • (S,G) entry corresponding to the multicast flow, and performs operations at block 1105 when the entry has been established, or performs operations at block 1106 when the entry has not been established.
  • At block 1105, the Rtr updates an aging time of the (S,G) entry, and operations at block 1107 are performed.
  • At block 1106, the Rtr establishes an (S,G) entry for the multicast flow, sets an aging time for the (S,G) entry, and forwards the multicast flow to all downstream PIM neighbors of the Rtr; after receiving a PIM prune message returned by a downstream PIM neighbor, adds the port from which the PIM prune message is received into an egress port list in the (S,G) entry as a prune port; after receiving a PIM graft message from a downstream PIM neighbor, adds the port from which the PIM graft message is received into an egress port list in the (S,G) entry as a forwarding port. The above operations are performed until all of the ports connected to downstream PIM neighbors are added into the (S,G) entry.
  • The aging time of the (S,G) entry is generally configured as three minutes.
  • At block 1107, the Rtr judges whether all egress ports in the (S,G) entry are prune ports, performs operations at block 1108 when all egress ports are prune ports, or performs operations at block 1109 when all egress ports are not prune ports.
  • At block 1108, the Rtr sends a PIM prune message to external devices via the port from which the multicast flow is received, and the process is terminated.
  • The upstream neighbor address of the PIM prune message is the IP address of the multicast source, the destination IP address is the IP address of the multicast source and the destination MAC address is the MAC address of the multicast source.
  • Since the PIM prune message is sent from the port via which the multicast flow enters the Rtr, the PIM prune message will reach the one or multiple layer-2 exchanges between the multicast source and the Rtr. The layer-2 exchange may perform the processing procedures shown in FIG. 5 after receiving the PIM prune message.
  • At block 1109, the Rtr forwards the multicast flow via each forwarding egress port in the (S,G) entry.
  • FIG. 12 is a flowchart illustrating a process performed by a first hop PIM router adopting PIM-DM after receiving a PIM graft message from a PIM neighbor according to an example. As shown in FIG. 12, the process may include the following operations.
  • At block 1201, a Rtr receives a PIM graft message for a multicast flow from a PIM neighbor, and searches in the Rtr for an (S,G) entry corresponding to the multicast flow.
  • At block 1202, the Rtr judges whether a list of egress ports in the (S,G) entry is empty, performs operations at block 1203 when the list is empty, or performs operations at block 1204 when the list is not empty.
  • At block 1203, the Rtr adds the port from which the PIM graft message is received into an egress port list of the (S,G) entry, searches in a unicast routing table for an entry corresponding to the destination IP address of the message, sends a PIM join message through an egress port in the unicast routing table entry, and the process is terminated.
  • The destination IP address of the PIM join message is the IP address of the multicast source and the destination MAC address is the MAC address of the multicast source. The PIM join message may be forwarded to the multicast source through layer-2 exchanges between the Rtr and the multicast source. The processing procedures of the PIM join message by a layer-2 exchange may be as shown in FIG. 9.
  • To avoid PIM join message loss and to receive the multicast flow quickly, the Rtr may send the PIM join message at a high frequency until the multicast flow is received.
  • At block 1204, the Rtr processes the PIM graft message according to a current PIM protocol.
  • After the first hop PIM router adopting the PIM-DM receives a PIM prune message from a downstream PIM router or an IGMP leave message from a client connected to the first hop PIM router, the processing procedures of the first hop PIM router are the same as those of a first hop PIM router adopting PIM-SSM, as in the example shown in FIG. 4.
  • After the first hop PIM router adopting the PIM-DM receives an IGMP join message from a downstream PIM router, the processing procedures of the first hop PIM router are the same as those of a first hop PIM router adopting PIM-SSM, as in the example shown in FIG. 8.
  • FIG. 13 is a schematic illustrating a structure of a PIM router provided by an example. The PIM router is a first hop PIM router, is connected to a multicast source via a layer-2 exchange having PIM snooping functions. As shown in FIG. 13, the PIM router may include: a first module and a second module.
  • The first module is to receive a multicast flow initiated from the multicast source, to delete the port from which a PIM prune message or a multicast group leave message is received from an egress port list of the multicast flow after receiving the PIM prune message from a downstream PIM router for the multicast flow or after receiving the multicast group leave message from a client connected to the PIM router, to determine whether the multicast flow is to be received, and to send a prune indication to the second module in response to a determination that the multicast flow is not to be received.
  • The multicast group leave message is an IGMP leave message or an MLD leave message.
  • The second module is to receive the prune indication, and to send a PIM prune message via the port from which the multicast flow is received.
  • When the PIM router adopts PIM-SSM, or is not a DR and adopts PIM-SM, the first module may include the following sub modules.
  • A first sub module is to receive the multicast flow and send information of the multicast flow to a second sub module.
  • The second sub module is to receive the information of the multicast flow from the first sub module, to determine that the multicast flow is not to be received and to send the prune indication to the second module when a determination that a multicast routing table entry has not been established for the multicast flow in the PIM router is made or when a determination that a multicast routing table entry has been established for the multicast flow but an egress port list of the multicast routing table entry is empty is made.
  • When the PIM router adopts PIM-SM and is DR, the first module may include the following sub modules.
  • A first sub module is to receive the multicast flow and send information of the multicast flow to a second sub module.
  • The second sub module is to receive the information of the multicast flow from the first sub module, to determine that the multicast flow is not to be received and to send the prune indication to the second module when a determination that a multicast routing table entry has been established for the multicast flow but an egress port list of the multicast routing table entry is empty is made; or to establish a multicast routing table entry for the multicast flow and to send a source register message to an RP when a determination that a multicast routing table entry has not been established for the multicast flow is made, to determine that the multicast flow is not to be received and to send the prune indication to the second module after receiving a source register stop message from the RP and determining that an egress port list of the multicast routing table entry is empty.
  • When the PIM router adopts PIM-DM, the first module may include the following sub modules.
  • A first sub module is to receive the multicast flow and send information of the multicast flow to a second sub module.
  • The second sub module is to receive the information of the multicast flow from the first sub module, to determine that the multicast flow is not to be received and to send the prune indication to the second module when determining a multicast routing table entry has been established for the multicast flow but all egress ports in the multicast routing table entry are prune ports; or to establish a multicast routing table entry for the multicast flow and to forward the multicast flow to all downstream PIM neighbors when a determination that a multicast routing table entry has not been established for the multicast flow is made; to receive a PIM prune message from a downstream PIM neighbor and to add the port from which the PIM graft message is received into an egress port list of the multicast routing table entry as a prune port; to receive a PIM graft message from a downstream PIM neighbor and to add the port from which the PIM graft message is received into an egress port list of the multicast routing table entry as a forwarding port; to determine that the multicast flow is not to be received and to send the prune indication to the second module after determining that all ports connected to the downstream PIM neighbors have been added into the egress port list of the multicast routing table list and that all egress ports in the multicast routing table entry are prune ports.
  • In practice, when the PIM router adopts PIM-SM or PIM-SSM, the first module may also include: a third module, to receive a PIM join message for the multicast flow from a downstream PIM router or a multicast group join message from a client connected to the PIM router, and to send a PIM join message in the direction of the multicast source.
  • The third module is further to determine whether a multicast routing table entry corresponding to the multicast flow has been established in the PIM router after receiving a PIM join message for the multicast flow from a downstream PIM router, to add the port from which the PIM join message is received into an egress port list of the multicast routing table entry and to send a PIM join message in the direction of the multicast source when a determination that the egress port list of the multicast routing table entry is empty is made.
  • In practice, when the PIM router adopts PIM-SM or PIM-SSM or PIM-DM, the PIM router may also include: a fourth module, to receive a multicast group join message for the multicast flow from a client connected to the PIM router, and to send a PIM join message in the direction of the multicast source.
  • The fourth module is further to determine whether a multicast routing table entry corresponding to the multicast flow has been established in the PIM router after receiving a multicast group join message for the multicast flow from a client connected to the PIM router, to add the port from which the multicast group join message is received into an egress port list of the multicast routing table entry and to send a PIM join message in the direction of the multicast source when a determination that the multicast routing table entry has been established and the egress port list of the multicast routing table entry is empty is made.
  • When the PIM router adopts PIM-SM and is not a DR, or adopts bi-directional PIM and is not a DR, the PIM router may also include: a fifth module, to send, for a multicast routing table entry established for each multicast flow, a PIM join message for the multicast flow in the direction of the multicast source when the PIM router was not a DR and becomes a DR.
  • When the PIM router adopts PIM-DM, the PIM router may also include: a sixth module, to receive a PIM graft message for the multicast flow from a downstream PIM neighbor, and to send a PIM join message in the direction of the multicast source.
  • The sixth module is further to judge whether a multicast routing table entry corresponding to the multicast flow has been established in the PIM router after receiving a PIM graft message for the multicast flow from a downstream PIM neighbor, to add the port from which the PIM graft message is received into an egress port list of the multicast routing table entry and to send a PIM join message in the direction of the multicast source when determining the multicast routing table entry has been established and the egress port list of the multicast routing table entry is empty.
  • The following is a description of a structure of a exchange with PIM snooping functions according to an example. The exchange is deployed between a multicast source and a first hop PIM router. The exchange may mainly include a first module, a second module and a third module.
  • The first module is to receive a PIM prune message for a multicast flow, to add a port from which the PIM prune message is received into a PIM snooping entry corresponding to the multicast flow as a prune port and to stop forwarding the multicast via the prune port when a determination that the upstream neighbor address in the message is not in a list of PIM routers which are maintained by PIM snooping functions of the exchange is made.
  • The first module may further set a prune time for a prune port, and begin forwarding the multicast flow via the prune port when the prune time expires.
  • The first module may further set a lifetime value that is smaller than the lifetime value of the multicast routing table entry of the multicast flow corresponding to the PIM prune message in the first hop PIM router; set the prune port as a temporary router port when the lifetime value of the prune port expires, and set the temporary router port as a router port if a PIM prune message for the multicast flow is not received within a pre-defined period of time, or set the temporary router port as a prune port and reset the lifetime value of the prune port if a PIM prune message for the multicast flow is received.
  • After determining the upstream neighbor address in the PIM prune message is not in the list of PIM routers that are maintained using the PIM snooping functions of the exchange, the first module may further establish a PIM snooping entry for the multicast flow when determining a PIM snooping entry has not been established for the multicast flow in the exchange, set an empty list as an upstream neighbor list of the PIM snooping entry, add all PIM neighbor ports except upstream ports of the exchange into an egress port list in the PIM snooping entry, add the prune port into the PIM snooping entry of the multicast flow; determine whether the multicast flow is to be forwarded based on PIM snooping entries and multicast group management entries in the exchange, and not forwarding the PIM prune message if the multicast flow is to be forwarded, or forwarding the PIM prune message in the direction of the multicast source if the multicast flow is not to be forwarded.
  • After determining the upstream neighbor address in the message is not in the list of PIM routers maintained by the PIM snooping functions, the first module may directly add the prune port into the PIM snooping entry of the multicast flow when determining the PIM snooping entry has been established for the multicast flow; determine whether the multicast flow is to be forwarded based on PIM snooping entries and multicast group management entries in the exchange, and not forwarding the PIM prune message if the multicast flow is to be forwarded, or forwarding the PIM prune message in the direction of the multicast source if the multicast flow is not to be forwarded.
  • When the layer-2 exchange adopts IGMP, the multicast group snooping entry is an IGMP snooping entry. When the layer-2 exchange adopts MLD, the multicast group snooping entry is an MLD snooping entry.
  • The second module is to receive a PIM join message for a multicast flow. When a determination that the upstream neighbor address in the message is not in a list of PIM routers that are maintained by PIM snooping functions of the exchange is made, a determination is made as to whether there is another port other than the port from which the PIM join message is received is to receive the multicast flow based on PIM snooping entries and multicast group management snooping entries in the exchange when a determination is made that there is a PIM snooping entry for the multicast flow corresponding to the PIM join message in the exchange and the port receiving the PIM join message is a prune port in the PIM snooping entry, the PIM join message is not forwarded when there is another port requiring receipt of the multicast flow, or the PIM join message is forwarded in the direction of the multicast source if there is no other port requiring receipt of the multicast flow.
  • The second module may further delete the port receiving the PIM join message from the PIM snooping entry after forwarding the PIM join message in the direction of the multicast source, and set the port as a router port.
  • The third module is to receive a multicast group management join message for a multicast flow, add the port receiving the message into a multicast group management entry of the multicast flow as a membership port, and forward the multicast group management join message via all router ports, prune ports and upstream neighbors in the PIM snooping entry except the port from which the message is received.
  • The multicast group management join message may be an IGMP join message or an MLD join message.
  • The example methods, systems and modules disclosed herein may be implemented by hardware, machine-readable instructions or a combination of hardware and machine-readable instructions. Machine-readable instructions used in the examples disclosed herein may be stored in storage medium readable by one or more processors, such as hard drive, CD-ROM, DVD, compact disk, floppy disk, magnetic tape drive, RAM, ROM or other proper storage device. Or, at least part of the machine-readable instructions may be substituted by specific-purpose hardware, such as custom integrated circuits, gate array, FPGA, PLD and specific-purpose computers and so on. For example, FIG. 14 is a schematic diagram illustrating a structure of a PIM router provided by another example. The PIM router is a first hop PIM router, and may be connected to a multicast source via a layer-2 exchange having PIM snooping functions. As shown in FIG. 14, the PIM router may include: a first module, a second module, and a processor. The first module and the second module may be stored in storage medium readable by the processor to cause the processor to perform similar functions as the first module and the second module shown in FIG. 13.
  • A machine-readable storage medium is also provided, which is to store instructions to cause a machine to execute a control method as disclosed herein. Specifically, a system or apparatus having a storage medium which stores machine-readable instructions which may be read and executed by one or more processors (e.g. a CPU or MPU etc) of the system or apparatus to implement the methods and functions described in the above examples.
  • In this situation, the machine readable instructions (e.g. program codes) read from the storage medium may implement any one of the above examples, thus the machine readable instructions and the storage medium storing the machine readable instructions are part of the technical scheme.
  • The storage medium for providing the machine readable instructions may include a floppy disk, hard drive, magneto-optical disk, compact disk (such as CD-ROM, CD-ft CD-RW, DVD-ROM, DVD-RAM, DVD-RW, DVD+RW), magnetic tape drive, Flash card, ROM and so on. Optionally, the machine readable instructions may be downloaded from a server computer via a communication network.
  • It should be noted that, alternatively to the machine readable instructions being executed by a computer, at least part of the operations performed by the machine readable instructions may be implemented by an operation system running in a computer following instructions based on the machine readable instructions to realize the technical scheme of any of the above examples.
  • In addition, the machine readable instructions implemented from a storage medium may be written in a storage in an extension board inserted in the computer or in a storage in an extension unit connected to the computer. In this example, a CPU in the extension board or the extension unit executes at least part of the operations according to the instructions based on the machine readable instructions to realize the technical scheme of any of the above examples.
  • The foregoing are only examples of the present disclosure and are not for use in limiting the protection of scope thereof. All modifications, equivalent replacements or improvements in accordance with the spirit and principles of the present disclosure shall be included in the protection scope of the present disclosure.

Claims (23)

1.-9. (canceled)
10. A layer-2 exchange with Protocol Independent Multicast (PIM) snooping functions, for deployment between a multicast source and a first hop PIM router, the layer-2 exchange comprising:
a first module to receive a PIM prune message for a multicast flow, to add a port from which the PIM prune message is received into a PIM snooping entry corresponding to the multicast flow as a prune port and to stop forwarding the multicast flow via the prune port in response to a determination that an upstream neighbor address in the PIM prune message is not in a list of PIM routers that are maintained by PIM snooping functions of the exchange.
11. The exchange of claim 10, wherein the first module is further to set a prune time for the prune port, and to begin forwarding the multicast flow to the prune port when the prune time expires.
12. The exchange of claim 10, wherein the first module is further to set a lifetime value that is smaller than the lifetime value of the multicast routing table entry of the multicast flow corresponding to the PIM prune message in the first hop PIM router; to set the prune port as a temporary router port when the lifetime value of the prune port expires, and to set the temporary router port as a router port if a PIM prune message for the multicast flow is not received within a pre-defined period of time, or to set the temporary router port as a prune port and reset the lifetime value of the prune port if a PIM prune message for the multicast flow is received.
13. The exchange of claim 10, wherein, the first module is further to, in response to a determination that the upstream neighbor address in the PIM prune message is not in a list of PIM routers using PIM snooping functions of the exchange and a PIM snooping entry has not been established for the multicast flow in the exchange, establish a PIM snooping entry for the multicast flow , to set an empty list as an upstream neighbor list in the PIM snooping entry, to add all ports connected to PIM neighbors except upstream ports into a downstream egress port list in the PIM snooping entry, to perform the adding of the prune port into the PIM snooping entry corresponding to the multicast flow; and
to determine whether the multicast flow corresponding to the PIM prune message is to be forwarded based on PIM snooping entries and multicast group management entries in the layer-2 exchange, forwarding no PIM prune message if the multicast flow corresponding to the PIM prune message is to be forwarded, or forwarding the PIM prune message in the direction of the multicast source if the multicast flow corresponding to the PIM prune message is not to be forwarded.
14. The exchange of claim 10, wherein the first module is further to directly perform the adding of the prune port into the PIM snooping entry corresponding to the multicast flow in response to a determination that an upstream neighbor address in the PIM prune message is not in a list of PIM routers using PIM snooping functions of the exchange and a PIM snooping entry has been established for the multicast flow in the exchange; and
to determine whether there the multicast flow corresponding to the PIM prune message is to be forwarded based on PIM snooping entries and multicast group management entries in the layer-2 exchange, forwarding no PIM prune message if the multicast flow corresponding to the PIM prune message is to be forwarded, or forwarding the PIM prune message in the direction of the multicast source if the multicast flow corresponding to the PIM prune message is not to be forwarded.
15. The exchange of claim 10, further comprising:
a second module to receive a PIM join message for a multicast flow; in response to a determination that the upstream neighbor address in the message is not in a list of PIM routers that are maintained by PIM snooping functions of the exchange, to determine whether there is another port other than the port from which the PIM join message is received is to receive the multicast flow based on PIM snooping entries and multicast group management snooping entries in the exchange in response to a determination that there is a PIM snooping entry for the multicast flow corresponding to the PIM join message in the exchange and the port receiving the PIM join message is a prune port in the PIM snooping entry, to forward no PIM join message when there is another port that is to receive the multicast flow, or to forward the PIM join message in the direction of the multicast source if there is no other port that is to receive the multicast flow.
16. The exchange of claim 15, wherein the second module is further to delete a mark which labels the port from which the PIM join message is received as a prune port and to set the port as a router port, and to delete the PIM snooping entry corresponding to the multicast flow if the downstream egress port list of the PIM snooping entry does not include a prune port and the upstream neighbor list is empty.
17. The exchange of claim 10, further comprising: a third module to receive a multicast group join message for a multicast flow, to add a port from which the multicast group join message is received into a multicast group management snooping entry corresponding to the multicast flow as a membership port, and to forward the multicast group join message to all router ports, prune ports and upstream neighbors in the PIM snooping entry except the port from which the multicast group join message is received.
18. A method for pruning a multicast branch in a network comprising a multicast source connected to a first hop PIM router via at least one layer-2 exchange with Protocol Independent Multicast (PIM) snooping functions, said method comprising:
receiving, by the first hop PIM router, a multicast flow initiated by the multicast source, sending a PIM prune message via a port from which the multicast flow is received in response to a determination that the multicast flow is not to be received; or
receiving, by the first hop PIM router, a PIM prune message for a multicast flow from a downstream PIM router or a multicast group leave message for a multicast flow from a client connected to the first hop PIM router, deleting a port via which the PIM prune message or the multicast group leave message is received from an egress port list corresponding to the multicast flow, and sending a PIM prune message addressed to the multicast source via the port from which the multicast flow is received in response to a determination that the multicast flow is not to be received.
19. The method of claim 18, further comprising:
receiving, by one of the at least one layer-2 exchange, the PIM prune message from the first hop PIM router, adding a port from which the PIM prune message is received into a PIM snooping entry corresponding to the multicast flow as a prune port and stopping forwarding of the multicast flow via the prune port when determining an upstream neighbor address in the PIM prune message is not in a list of PIM routers which are maintained by PIM snooping functions of the exchange.
20. A Protocol Independent Multicast (PIM) router, connected to a multicast source via at least one layer-2 exchange, comprising:
a first module to receive a multicast flow initiated by the multicast source, to determine whether the multicast flow is to be received, to send a prune indication to a second module in response to a determination that the multicast flow is not to be received; or, to receive a PIM prune message for the multicast flow from a downstream PIM router or a multicast group leave message for the multicast flow from a client connected to the PIM router, to delete a port via which the PIM prune message or the multicast group leave message is received from an egress port list corresponding to the multicast flow, to determine whether there the multicast flow is to be received, to send a prune indication to a second module in response to a determination that the multicast flow is not to be received; and
the second module to receive the prune indication, and to send a PIM prune message addressed to the multicast source via the port from which the multicast flow is received.
21. The PIM router of claim 20, wherein when the PIM router adopts PIM-SSM, or adopts PIM-SM and is not a Designated Router (DR), or adopts bi-directional PIM and is not a DR,
the first module comprises:
a first sub module to receive the multicast flow and send information of the multicast flow to a second sub module; and
wherein the second sub module is to receive the information of the multicast flow from the first sub module, to determine that the multicast flow is not to be received and to send the prune indication to the second module in response to a determination that a multicast routing table entry has not been established for the multicast flow in the PIM router or in response to a determination that a multicast routing table entry has been established for the multicast flow but an egress port list of the multicast routing table entry is empty.
22. The PIM router of claim 20, wherein when the PIM router adopts PIM-SM and is a DR,
the first module comprises:
a first sub module to receive the multicast flow and send information of the multicast flow to a second sub module; and
wherein the second sub module is:
to receive the information of the multicast flow from the first sub module, to determine that the multicast flow is not to be received and to send the prune indication to the second module in response to a determination that a multicast routing table entry has been established for the multicast flow but an egress port list of the multicast routing table entry is empty;
or
to determine that the multicast flow is not to be received and to send the prune indication to the second module after receiving a source register stop message from an RP and determining that an egress port list of the multicast routing table entry is empty.
23. The PIM router of claim 20, wherein when the PIM router adopts PIM-DM, the first module comprises:
a first sub module to receive the multicast flow and send information of the multicast flow to a second sub module; and
wherein the second sub module is:
to receive the information of the multicast flow from the first sub module, to determine that the multicast flow is not to be received and to send the prune indication to the second module in response to a determination that a multicast routing table entry has been established for the multicast flow but all egress ports in the multicast routing table entry are prune ports;
or to receive a PIM prune message from a downstream PIM neighbor and to add the port from which the PIM prune message is received into an egress port list of the multicast routing table entry as a prune port; to receive a PIM graft message from a downstream PIM neighbor and to add the port from which the PIM graft message is received into an egress port list of the multicast routing table entry as a forwarding port; to determine that the multicast flow is not to be received and to send the prune indication to the second module after determining that all ports connected to the downstream PIM neighbors have been added into the egress port list of the multicast routing table entry and that all egress ports in the multicast routing table entry are prune ports.
24. The PIM router of claim 20, wherein when the PIM router adopts PIM-SM or PIM-SSM, the PIM router further comprises:
a third module to receive a PIM join message for the multicast flow sent by a downstream PIM router, and to send a PIM join message in the direction of the multicast source; or
when the PIM router adopts PIM-SM or PIM-SSM or PIM-DM, the PIM router further comprises:
a third module to receive a multicast group join message for the multicast flow sent by a client connected to PIM router, and to send a PIM join message in the direction of the multicast source.
25. The PIM router of claim 24, wherein the third module is further to:
determine whether a multicast routing table entry has been established for the multicast flow in the PIM router after receiving the PIM join message from the downstream PIM router or the multicast group join message from the client, to add a port from which the PIM join message or the multicast group join message is received into an egress port list in the multicast routing table entry, and to perform the sending the PIM join message in the direction of the multicast source.
26. The PIM router of claim 20, further comprising:
when the PIM router adopts PIM-SM and is not a DR, or adopts bi-directional PIM and is not a DR,
a fourth module to send a PIM join message in the direction of a multicast source of each multicast flow according to a multicast routing table entry corresponding to the multicast flow when the first hop PIM router was not a DR and becomes a DR.
27. The PIM router of claim 20, further comprising:
when the PIM router adopts PIM-DM,
a fifth module to receive a PIM graft message for the multicast flow from a downstream PIM neighbor, and to send a PIM join message in the direction of the multicast source.
28. The PIM router of claim 27, wherein the fifth module is further to:
determine whether a multicast routing table entry corresponding to the multicast flow has been established in the PIM router after receiving a PIM graft message for the multicast flow from a downstream PIM neighbor, to add the port from which the PIM graft message is received into an egress port list of the multicast routing table entry and to send a PIM join message in the direction of the multicast source when determining the multicast routing table entry has been established and the egress port list of the multicast routing table entry is empty.
29. A method for pruning a multicast branch, said method comprising:
receiving, by a layer-2 exchange, a PIM prune message for a multicast flow;
adding, by the layer-2 exchange, a port from which the PIM prune message is received into a PIM snooping entry corresponding to the multicast flow as a prune port and stopping forwarding the multicast flow via the prune port in response to a determination that an upstream neighbor address in the PIM prune message is not in a list of PIM routers that are maintained by PIM snooping functions of the exchange.
30. The method of claim 29, further comprising:
establishing, by the layer-2 exchange, a PIM snooping entry for the multicast flow in response to a determination that a PIM snooping entry has not been established for the multicast flow in the layer-2 exchange, adding all ports connected to PIM neighbors except upstream ports and prune ports into the PIM snooping entry; and
forwarding, by the layer-2 exchange, the PIM prune message in the direction of the multicast source in response to a determination that the multicast flow corresponding to the PIM prune message is not to be forwarded.
31. The method of claim 29, further comprising:
receiving, by the layer-2 exchange, a PIM join message for a multicast flow;
deleting, by the layer-2 exchange, a mark which labels the port from which the PIM join message is received as a prune port after forwarding the PIM join message in the direction of the multicast source, and labeling the port as a router port;
deleting, by the layer-2 exchange, the PIM snooping table entry corresponding to the multicast flow in response to a determination that the PIM snooping table entry does not include a prune port; and
forwarding, by the layer-2 exchange, the PIM join message in the direction of the multicast source in response to a determination that there is no other port that is to receive the multicast flow.
US13/876,141 2010-09-30 2011-09-30 Method for pruning a multicast branch, protocol independent multicast router, and layer-2 exchange Active 2032-02-21 US9497034B2 (en)

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
CN201010502531 2010-09-30
CN201010502531 2010-09-30
CN201010502531.2 2010-09-30
CN201010613223 2010-12-21
CN201010613223.7 2010-12-21
CN2010106132237A CN102075417B (en) 2010-09-30 2010-12-21 Multicast cutting method, protocol independent multicast router
PCT/CN2011/080482 WO2012041257A1 (en) 2010-09-30 2011-09-30 Method for pruning a multicast branch, protocol independent multicast router, and layer-2 exchange

Publications (2)

Publication Number Publication Date
US20130201988A1 true US20130201988A1 (en) 2013-08-08
US9497034B2 US9497034B2 (en) 2016-11-15

Family

ID=44033769

Family Applications (1)

Application Number Title Priority Date Filing Date
US13/876,141 Active 2032-02-21 US9497034B2 (en) 2010-09-30 2011-09-30 Method for pruning a multicast branch, protocol independent multicast router, and layer-2 exchange

Country Status (6)

Country Link
US (1) US9497034B2 (en)
EP (1) EP2622805B1 (en)
JP (1) JP5619290B2 (en)
KR (2) KR101649244B1 (en)
CN (1) CN102075417B (en)
WO (1) WO2012041257A1 (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140122675A1 (en) * 2012-10-29 2014-05-01 Oracle International Corporation Network virtualization over infiniband
US20140204938A1 (en) * 2013-01-18 2014-07-24 International Business Machines Corporation Multicast route entry synchronization
US20140204732A1 (en) * 2013-01-18 2014-07-24 International Business Machines Corporation Multicast traffic forwarding on pruned interface
US20150139228A1 (en) * 2013-09-17 2015-05-21 Cisco Technology, Inc. Overlay Signaling For Bit Indexed Explicit Replication
JP2015192391A (en) * 2014-03-28 2015-11-02 富士通株式会社 Network system, packet transmission device, packet transmission method, and information processing program
US9264384B1 (en) 2004-07-22 2016-02-16 Oracle International Corporation Resource virtualization mechanism including virtual host bus adapters
US9331963B2 (en) 2010-09-24 2016-05-03 Oracle International Corporation Wireless host I/O using virtualized I/O controllers
US9544230B2 (en) 2013-09-17 2017-01-10 Cisco Technology, Inc. Migration support for bit indexed explicit replication
US9571897B2 (en) 2013-09-17 2017-02-14 Cisco Technology, Inc. Bit indexed explicit replication for professional media networks
US9806897B2 (en) 2013-09-17 2017-10-31 Cisco Technology, Inc. Bit indexed explicit replication forwarding optimization
US9813283B2 (en) 2005-08-09 2017-11-07 Oracle International Corporation Efficient data transfer between servers and remote peripherals
US9853822B2 (en) 2013-09-17 2017-12-26 Cisco Technology, Inc. Bit indexed explicit replication
US9906378B2 (en) 2015-01-27 2018-02-27 Cisco Technology, Inc. Capability aware routing
US9948574B2 (en) 2013-09-17 2018-04-17 Cisco Technology, Inc. Bit indexed explicit replication packet encapsulation
US9973446B2 (en) 2009-08-20 2018-05-15 Oracle International Corporation Remote shared server peripherals over an Ethernet network for resource virtualization
US10003494B2 (en) 2013-09-17 2018-06-19 Cisco Technology, Inc. Per-prefix LFA FRR with bit indexed explicit replication
US20180191515A1 (en) * 2016-12-30 2018-07-05 Juniper Networks, Inc. Multicast flow prioritization
US10020952B1 (en) * 2013-07-16 2018-07-10 Juniper Networks, Inc. PIM relay mode in computer networks
US10122614B2 (en) 2015-02-26 2018-11-06 Cisco Technology, Inc. Failure protection for traffic-engineered bit indexed explicit replication
US10164794B2 (en) 2017-04-28 2018-12-25 Cisco Technology, Inc. Bridging of non-capable subnetworks in bit indexed explicit replication
US10218524B2 (en) 2013-09-17 2019-02-26 Cisco Technology, Inc. Bit indexed explicit replication for layer 2 networking
US10432425B2 (en) 2017-03-30 2019-10-01 Cisco Technology, Inc. Internet protocol based encapsulation for bit indexed explicit replication (BIER)
US10630743B2 (en) 2016-09-23 2020-04-21 Cisco Technology, Inc. Unicast media replication fabric using bit indexed explicit replication
US10637675B2 (en) 2016-11-09 2020-04-28 Cisco Technology, Inc. Area-specific broadcasting using bit indexed explicit replication
US20210250272A1 (en) * 2017-12-29 2021-08-12 Alibaba Group Holding Limited Network communication method and apparatus
US20210367843A1 (en) * 2017-07-25 2021-11-25 Cisco Technology, Inc. Detecting and resolving multicast traffic performance issues
US11451474B2 (en) 2013-09-17 2022-09-20 Cisco Technology, Inc. Equal cost multi-path with bit indexed explicit replication

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075417B (en) * 2010-09-30 2013-11-06 杭州华三通信技术有限公司 Multicast cutting method, protocol independent multicast router
CN102595248B (en) * 2012-01-18 2014-02-26 杭州华三通信技术有限公司 Multicast forwarding table item maintaining method and protocol independent multicast router
CN102833082B (en) * 2012-09-24 2015-11-25 杭州华三通信技术有限公司 A kind of multicast pruning method and routing device
CN103516616B (en) * 2013-10-18 2017-02-15 杭州华三通信技术有限公司 Transmission method and equipment for SA messages
US10516545B2 (en) 2013-12-31 2019-12-24 Telecom Italia S.P.A. Congestion management in a multicast communication network
CN105591942B (en) * 2014-10-23 2019-12-17 中兴通讯股份有限公司 Method and device for optimizing multicast protocol
CN105704046A (en) * 2014-11-27 2016-06-22 中兴通讯股份有限公司 Multicast routing table entry processing method and device
CN109729009B (en) * 2017-10-31 2022-08-26 华为技术有限公司 Method and device for realizing multicast service
US11297468B2 (en) 2018-11-08 2022-04-05 Juganu, Ltd. Efficient multicast group routing across tree-based wireless network
US11310306B2 (en) 2018-11-08 2022-04-19 Juganu, Ltd. Systems and methods for reliable firmware update in tree-based wireless networks
WO2020095114A1 (en) * 2018-11-08 2020-05-14 Juganu Ltd. Systems and methods for multicast group routing, firmware updating, and next-hop routing in tree-based wireless networks
US11166220B2 (en) 2018-11-08 2021-11-02 Juganu, Ltd. Next-hop routing over a plurality of distinct channels in a mesh network
US11516115B2 (en) * 2020-08-18 2022-11-29 Juniper Networks, Inc. Weighted multicast join load balance

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6785274B2 (en) * 1998-10-07 2004-08-31 Cisco Technology, Inc. Efficient network multicast switching apparatus and methods
US6847638B1 (en) * 2000-10-16 2005-01-25 Cisco Technology, Inc. Multicast system for forwarding desired multicast packets in a computer network
US7389359B2 (en) * 2001-10-19 2008-06-17 Foundry Networks, Inc. Method and system for intelligently forwarding multicast packets
US8099516B1 (en) * 2004-02-23 2012-01-17 Avaya Inc. Protocol independent multicast designated router enhancements for supporting internet group management protocol in a multi-access network
US8644310B2 (en) * 2007-10-30 2014-02-04 Media Patents, S.L. Method for managing multicast traffic between equipment in a multicast data network
US8761044B2 (en) * 2010-06-11 2014-06-24 Juniper Networks, Inc. Selection of multicast router interfaces in an L2 switch connecting end hosts and routers, which is running IGMP and PIM snooping

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7564806B1 (en) 2004-08-30 2009-07-21 Juniper Networks, Inc. Aggregate multicast trees for multicast virtual private networks
JP2006087014A (en) 2004-09-17 2006-03-30 Fujitsu Ltd Layer-2 switch
CN100450086C (en) 2005-09-07 2009-01-07 华为技术有限公司 Method for implementing multicast data stream retransmission in virtual special LAN service
CN100440818C (en) 2006-07-18 2008-12-03 杭州华三通信技术有限公司 Method for raising group broadcasting requested broadcasting success rate and protocol extraneous group broadcasting routing device
CN100492977C (en) * 2006-07-18 2009-05-27 杭州华三通信技术有限公司 Method and system for crossing virtual local network group broadcasting under assigned source group broadcasting protocol independent group broadcasting mode
JP2009021940A (en) 2007-07-13 2009-01-29 Sharp Corp Bridge apparatus
US8064449B2 (en) * 2007-10-15 2011-11-22 Media Patents, S.L. Methods and apparatus for managing multicast traffic
JP2009246845A (en) 2008-03-31 2009-10-22 Nippon Telegr & Teleph Corp <Ntt> Multicast packet transfer device, transfer method, and transfer control program
CN101291240B (en) * 2008-06-19 2010-08-25 杭州华三通信技术有限公司 Multicast flow transmission method and system
CN101340305B (en) * 2008-08-07 2012-05-09 中兴通讯股份有限公司 Multicast method, system and access apparatus of specific source
CN102075417B (en) 2010-09-30 2013-11-06 杭州华三通信技术有限公司 Multicast cutting method, protocol independent multicast router

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6785274B2 (en) * 1998-10-07 2004-08-31 Cisco Technology, Inc. Efficient network multicast switching apparatus and methods
US6847638B1 (en) * 2000-10-16 2005-01-25 Cisco Technology, Inc. Multicast system for forwarding desired multicast packets in a computer network
US7389359B2 (en) * 2001-10-19 2008-06-17 Foundry Networks, Inc. Method and system for intelligently forwarding multicast packets
US8099516B1 (en) * 2004-02-23 2012-01-17 Avaya Inc. Protocol independent multicast designated router enhancements for supporting internet group management protocol in a multi-access network
US8644310B2 (en) * 2007-10-30 2014-02-04 Media Patents, S.L. Method for managing multicast traffic between equipment in a multicast data network
US8761044B2 (en) * 2010-06-11 2014-06-24 Juniper Networks, Inc. Selection of multicast router interfaces in an L2 switch connecting end hosts and routers, which is running IGMP and PIM snooping

Cited By (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9264384B1 (en) 2004-07-22 2016-02-16 Oracle International Corporation Resource virtualization mechanism including virtual host bus adapters
US9813283B2 (en) 2005-08-09 2017-11-07 Oracle International Corporation Efficient data transfer between servers and remote peripherals
US10880235B2 (en) 2009-08-20 2020-12-29 Oracle International Corporation Remote shared server peripherals over an ethernet network for resource virtualization
US9973446B2 (en) 2009-08-20 2018-05-15 Oracle International Corporation Remote shared server peripherals over an Ethernet network for resource virtualization
US9331963B2 (en) 2010-09-24 2016-05-03 Oracle International Corporation Wireless host I/O using virtualized I/O controllers
US9083550B2 (en) * 2012-10-29 2015-07-14 Oracle International Corporation Network virtualization over infiniband
US20140122675A1 (en) * 2012-10-29 2014-05-01 Oracle International Corporation Network virtualization over infiniband
US20140204938A1 (en) * 2013-01-18 2014-07-24 International Business Machines Corporation Multicast route entry synchronization
US20140204732A1 (en) * 2013-01-18 2014-07-24 International Business Machines Corporation Multicast traffic forwarding on pruned interface
US8976644B2 (en) * 2013-01-18 2015-03-10 International Business Machines Corporation Multicast traffic forwarding on pruned interface
US9036634B2 (en) * 2013-01-18 2015-05-19 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Multicast route entry synchronization
US10020952B1 (en) * 2013-07-16 2018-07-10 Juniper Networks, Inc. PIM relay mode in computer networks
US10764076B2 (en) 2013-09-17 2020-09-01 Cisco Technology, Inc. Bit indexed explicit replication for layer 2 networking
US11601296B2 (en) 2013-09-17 2023-03-07 Cisco Technology, Inc. Bit indexed explicit replication for layer 2 networking
US9853822B2 (en) 2013-09-17 2017-12-26 Cisco Technology, Inc. Bit indexed explicit replication
US11153108B2 (en) 2013-09-17 2021-10-19 Cisco Technology, Inc. Bit indexed explicit replication using multiprotocol label switching
US9942053B2 (en) 2013-09-17 2018-04-10 Cisco Technology, Inc. Bit indexed explicit replication using internet protocol version 6
US9948574B2 (en) 2013-09-17 2018-04-17 Cisco Technology, Inc. Bit indexed explicit replication packet encapsulation
US9571897B2 (en) 2013-09-17 2017-02-14 Cisco Technology, Inc. Bit indexed explicit replication for professional media networks
US10003494B2 (en) 2013-09-17 2018-06-19 Cisco Technology, Inc. Per-prefix LFA FRR with bit indexed explicit replication
US11044112B2 (en) 2013-09-17 2021-06-22 Cisco Technology, Inc. Bit indexed explicit forwarding optimization
US9544230B2 (en) 2013-09-17 2017-01-10 Cisco Technology, Inc. Migration support for bit indexed explicit replication
US10033632B2 (en) 2013-09-17 2018-07-24 Cisco Technology, Inc. Migration support for bit indexed explicit replication
US9806897B2 (en) 2013-09-17 2017-10-31 Cisco Technology, Inc. Bit indexed explicit replication forwarding optimization
US11646906B2 (en) 2013-09-17 2023-05-09 Cisco Technology, Inc. Bit indexed explicit forwarding optimization
US20150139228A1 (en) * 2013-09-17 2015-05-21 Cisco Technology, Inc. Overlay Signaling For Bit Indexed Explicit Replication
US10218524B2 (en) 2013-09-17 2019-02-26 Cisco Technology, Inc. Bit indexed explicit replication for layer 2 networking
US10225090B2 (en) 2013-09-17 2019-03-05 Cisco Technology, Inc. Bit indexed explicit replication using multiprotocol label switching
US10708075B2 (en) 2013-09-17 2020-07-07 Cisco Technology, Inc. Bit indexed explicit replication using internet protocol version 6
US10659242B2 (en) 2013-09-17 2020-05-19 Cisco Technology, Inc. Bit indexed explicit replication using multiprotocol label switching
US10404482B2 (en) 2013-09-17 2019-09-03 Cisco Technology, Inc. Bit indexed explicit replication forwarding optimization
US11206148B2 (en) 2013-09-17 2021-12-21 Cisco Technology, Inc. Bit indexed explicit replication
US11451474B2 (en) 2013-09-17 2022-09-20 Cisco Technology, Inc. Equal cost multi-path with bit indexed explicit replication
US10461946B2 (en) * 2013-09-17 2019-10-29 Cisco Technology, Inc. Overlay signaling for bit indexed explicit replication
US10498547B2 (en) 2013-09-17 2019-12-03 Cisco Technology, Inc. Bit indexed explicit replication
US10536324B2 (en) 2013-09-17 2020-01-14 Cisco Technology, Inc. Per-prefix LFA FRR with bit indexed explicit replication
JP2015192391A (en) * 2014-03-28 2015-11-02 富士通株式会社 Network system, packet transmission device, packet transmission method, and information processing program
US9906378B2 (en) 2015-01-27 2018-02-27 Cisco Technology, Inc. Capability aware routing
US10637686B2 (en) 2015-01-27 2020-04-28 Cisco Technology, Inc. Capability aware routing
US10171263B2 (en) 2015-01-27 2019-01-01 Cisco Technology, Inc. Capability aware routing
US10958566B2 (en) 2015-02-26 2021-03-23 Cisco Technology, Inc. Traffic engineering for bit indexed explicit replication
US10693765B2 (en) 2015-02-26 2020-06-23 Cisco Technology, Inc. Failure protection for traffic-engineered bit indexed explicit replication
US10341221B2 (en) 2015-02-26 2019-07-02 Cisco Technology, Inc. Traffic engineering for bit indexed explicit replication
US10341222B2 (en) 2015-02-26 2019-07-02 Cisco Technology, Inc. Traffic engineering for bit indexed explicit replication
US10122614B2 (en) 2015-02-26 2018-11-06 Cisco Technology, Inc. Failure protection for traffic-engineered bit indexed explicit replication
US11297117B2 (en) 2016-09-23 2022-04-05 Cisco Technology, Inc. Unicast media replication fabric using bit indexed explicit replication
US10630743B2 (en) 2016-09-23 2020-04-21 Cisco Technology, Inc. Unicast media replication fabric using bit indexed explicit replication
US10637675B2 (en) 2016-11-09 2020-04-28 Cisco Technology, Inc. Area-specific broadcasting using bit indexed explicit replication
US11438186B2 (en) 2016-11-09 2022-09-06 Cisco Technology, Inc. Area-specific broadcasting using bit indexed explicit replication
US10999090B2 (en) * 2016-12-30 2021-05-04 Juniper Networks, Inc. Multicast flow prioritization
US20180191515A1 (en) * 2016-12-30 2018-07-05 Juniper Networks, Inc. Multicast flow prioritization
US10985942B2 (en) 2017-03-30 2021-04-20 Cisco Technology, Inc. Multicast traffic steering using tree identity in bit indexed explicit replication (BIER)
US10447496B2 (en) 2017-03-30 2019-10-15 Cisco Technology, Inc. Multicast traffic steering using tree identity in bit indexed explicit replication (BIER)
US10432425B2 (en) 2017-03-30 2019-10-01 Cisco Technology, Inc. Internet protocol based encapsulation for bit indexed explicit replication (BIER)
US11303470B2 (en) 2017-04-28 2022-04-12 Cisco Technology, Inc. Bridging of non-capable subnetworks in bit indexed explicit replication
US10574479B2 (en) 2017-04-28 2020-02-25 Cisco Technology, Inc. Bridging of non-capable subnetworks in bit indexed explicit replication
US10164794B2 (en) 2017-04-28 2018-12-25 Cisco Technology, Inc. Bridging of non-capable subnetworks in bit indexed explicit replication
US20210367843A1 (en) * 2017-07-25 2021-11-25 Cisco Technology, Inc. Detecting and resolving multicast traffic performance issues
US20210250272A1 (en) * 2017-12-29 2021-08-12 Alibaba Group Holding Limited Network communication method and apparatus

Also Published As

Publication number Publication date
US9497034B2 (en) 2016-11-15
JP5619290B2 (en) 2014-11-05
CN102075417B (en) 2013-11-06
EP2622805A1 (en) 2013-08-07
KR20130045927A (en) 2013-05-06
CN102075417A (en) 2011-05-25
EP2622805A4 (en) 2015-05-06
KR101566846B1 (en) 2015-11-09
KR20150003394A (en) 2015-01-08
WO2012041257A1 (en) 2012-04-05
EP2622805B1 (en) 2016-11-02
KR101649244B1 (en) 2016-08-18
JP2013543687A (en) 2013-12-05

Similar Documents

Publication Publication Date Title
US9497034B2 (en) Method for pruning a multicast branch, protocol independent multicast router, and layer-2 exchange
US10645132B2 (en) Selectively signaling selective tunnels in multicast VPNs
US7522596B2 (en) Enhanced DVMRP for destination-based forwarding of multicast data
EP1869848B1 (en) Building multipoint-to-multipoint label switch paths
US8009671B2 (en) Multicast method and multicast routing method
US9509636B2 (en) Multicast traffic management within a wireless mesh network
US6654371B1 (en) Method and apparatus for forwarding multicast data by relaying IGMP group membership
US9838303B2 (en) PIM source discovery by last hop router
US10270604B2 (en) PIM join entropy
US10855579B2 (en) Optimizing IP multicast delivery with use of local source nodes and the propagation of advertisements therefor
US10382217B1 (en) Single actual-forwarder election in multicast VPNs
US11582054B2 (en) Multicast source discovery protocol (MSDP) loop avoidance
US11018886B1 (en) Methods and apparatus for selectively filtering an IP multicast data stream for selected group members of a multicast group
EP3923529A1 (en) Multicast source discovery protocol (msdp) loop avoidance
CN114915588B (en) Upstream multicast hop UMH extension for anycast deployment
CN117978721A (en) Upstream multicast hop UMH extension for anycast deployment
Green et al. Network Working Group Yiqun Cai Internet-Draft Sri Vallepalli Intended status: Standards Track Heidi Ou Expires: April 17, 2012 Cisco Systems, Inc.

Legal Events

Date Code Title Description
AS Assignment

Owner name: HANGZHOU H3C TECHNOLOGIES CO., LTD., CHINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ZHOU, DI;LIU, YU;CHEN, QIANYE;AND OTHERS;REEL/FRAME:030098/0120

Effective date: 20111129

AS Assignment

Owner name: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:H3C TECHNOLOGIES CO., LTD.;HANGZHOU H3C TECHNOLOGIES CO., LTD.;REEL/FRAME:039767/0263

Effective date: 20160501

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4